sertrap_amd64.go:122] [ 603: 603] Allocate a new trap: 0xc000d992c0 14 D0712 20:23:43.564122 30218 usertrap_amd64.go:225] [ 603: 603] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:43.564198 30218 task_exit.go:204] [ 603: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.564281 30218 task_exit.go:204] [ 603: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.564315 30218 task_signals.go:204] [ 603: 605] Signal 603, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.564339 30218 task_exit.go:204] [ 603: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.564348 30218 task_exit.go:204] [ 603: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.564357 30218 task_exit.go:204] [ 603: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.564377 30218 task_signals.go:204] [ 603: 606] Signal 603, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.564379 30218 task_signals.go:204] [ 603: 604] Signal 603, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.564401 30218 task_signals.go:204] [ 603: 607] Signal 603, PID: 607, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.564413 30218 task_exit.go:204] [ 603: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.564450 30218 task_signals.go:204] [ 603: 608] Signal 603, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.564483 30218 task_exit.go:204] [ 603: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.564509 30218 task_exit.go:204] [ 603: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.564528 30218 task_exit.go:204] [ 603: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.564546 30218 task_exit.go:204] [ 603: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.564564 30218 task_exit.go:204] [ 603: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.564570 30218 task_exit.go:204] [ 603: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.564582 30218 task_exit.go:204] [ 603: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.564598 30218 task_exit.go:204] [ 603: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.564607 30218 task_exit.go:204] [ 603: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.565880 30218 task_exit.go:204] [ 603: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.566110 30218 task_exit.go:204] [ 603: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.566181 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.566327 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.566398 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.566644 30218 task_exit.go:204] [ 603: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.567579 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.568882 30218 syscalls.go:262] [ 609: 609] Allocating stack with size of 8388608 bytes D0712 20:23:43.569133 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.570038 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.570238 30218 usertrap_amd64.go:106] [ 609: 609] Map a usertrap vma at 60000 D0712 20:23:43.570321 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 1 D0712 20:23:43.570345 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:43.570613 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.570635 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 2 D0712 20:23:43.570646 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:43.571054 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.571074 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 3 D0712 20:23:43.571082 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:43.578600 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.578646 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 4 D0712 20:23:43.578669 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:43.579805 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.579835 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 5 D0712 20:23:43.579844 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:43.579893 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.579912 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 6 D0712 20:23:43.579921 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:43.580228 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.580250 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 7 D0712 20:23:43.580259 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:43.580438 30218 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.580471 30218 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc000d99410 8 D0712 20:23:43.580480 30218 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:43.580624 30218 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.580633 30218 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc000d99410 9 D0712 20:23:43.580639 30218 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:43.580685 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.580690 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 10 D0712 20:23:43.580695 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:43.589080 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.589134 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 11 D0712 20:23:43.589154 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:43.591431 30218 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.591476 30218 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc000d99410 12 D0712 20:23:43.591491 30218 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:43.591512 30218 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.591517 30218 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc000d99410 13 D0712 20:23:43.591522 30218 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:43.591547 30218 task_signals.go:470] [ 609: 609] Notified of signal 23 D0712 20:23:43.591694 30218 task_signals.go:220] [ 609: 609] Signal 23: delivering to handler D0712 20:23:43.599916 30218 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.599960 30218 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc000d99410 14 D0712 20:23:43.599975 30218 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:43.600004 30218 task_exit.go:204] [ 609: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.600026 30218 task_exit.go:204] [ 609: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.600063 30218 task_signals.go:204] [ 609: 610] Signal 609, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.600078 30218 task_exit.go:204] [ 609: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.600088 30218 task_exit.go:204] [ 609: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.600094 30218 task_exit.go:204] [ 609: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.600118 30218 task_signals.go:204] [ 609: 612] Signal 609, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.600133 30218 task_signals.go:204] [ 609: 611] Signal 609, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.600139 30218 task_exit.go:204] [ 609: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.600149 30218 task_signals.go:204] [ 609: 613] Signal 609, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.600156 30218 task_exit.go:204] [ 609: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.600160 30218 task_exit.go:204] [ 609: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.600171 30218 task_exit.go:204] [ 609: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.600179 30218 task_exit.go:204] [ 609: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.600186 30218 task_exit.go:204] [ 609: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.600195 30218 task_exit.go:204] [ 609: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.601454 30218 task_exit.go:204] [ 609: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.601496 30218 task_exit.go:204] [ 609: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.601517 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.601547 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.601558 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.601652 30218 task_exit.go:204] [ 609: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.604385 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.605601 30218 syscalls.go:262] [ 614: 614] Allocating stack with size of 8388608 bytes D0712 20:23:43.605836 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.606719 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.606813 30218 usertrap_amd64.go:106] [ 614: 614] Map a usertrap vma at 64000 D0712 20:23:43.606968 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 1 D0712 20:23:43.607032 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:43.607465 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.607494 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 2 D0712 20:23:43.607508 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:43.608255 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.608277 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 3 D0712 20:23:43.608288 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:43.615398 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.615441 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 4 D0712 20:23:43.615459 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:43.616636 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.616681 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 5 D0712 20:23:43.616698 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:43.616753 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.616759 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 6 D0712 20:23:43.616785 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:43.617433 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.617467 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 7 D0712 20:23:43.617479 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:43.617726 30218 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.617753 30218 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0004ec810 8 D0712 20:23:43.617782 30218 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:43.618095 30218 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.618126 30218 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0004ec810 9 D0712 20:23:43.618140 30218 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:43.618155 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.618161 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 10 D0712 20:23:43.618169 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:43.618435 30218 usertrap_amd64.go:212] [ 614: 617] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.618587 30218 usertrap_amd64.go:122] [ 614: 617] Allocate a new trap: 0xc0004ec810 11 D0712 20:23:43.618651 30218 usertrap_amd64.go:225] [ 614: 617] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:43.626270 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.626311 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 12 D0712 20:23:43.626327 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:43.628749 30218 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.628801 30218 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0004ec810 13 D0712 20:23:43.628818 30218 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:43.628842 30218 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.628850 30218 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0004ec810 14 D0712 20:23:43.628892 30218 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:43.629018 30218 task_signals.go:470] [ 614: 614] Notified of signal 23 D0712 20:23:43.629109 30218 task_signals.go:220] [ 614: 614] Signal 23: delivering to handler I0712 20:23:43.636427 30218 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0712 20:23:43.636603 30218 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.636623 30218 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004ec810 15 D0712 20:23:43.636639 30218 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0712 20:23:43.636718 30218 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.636759 30218 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.636785 30218 task_signals.go:204] [ 614: 617] Signal 614, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.636798 30218 task_exit.go:204] [ 614: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.636804 30218 task_exit.go:204] [ 614: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.636808 30218 task_exit.go:204] [ 614: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.636823 30218 task_signals.go:204] [ 614: 618] Signal 614, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.636804 30218 task_signals.go:204] [ 614: 616] Signal 614, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.636849 30218 task_exit.go:204] [ 614: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.636829 30218 task_signals.go:204] [ 614: 615] Signal 614, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.636851 30218 task_signals.go:204] [ 614: 619] Signal 614, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.636858 30218 task_exit.go:204] [ 614: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.636881 30218 task_exit.go:204] [ 614: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.636909 30218 task_exit.go:204] [ 614: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.636934 30218 task_exit.go:204] [ 614: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.636982 30218 task_exit.go:204] [ 614: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.637019 30218 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.637091 30218 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.637101 30218 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.637125 30218 task_exit.go:204] [ 614: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.638415 30218 task_exit.go:204] [ 614: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.638453 30218 task_exit.go:204] [ 614: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.638466 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.638500 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.638510 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.638630 30218 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.639272 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.640639 30218 syscalls.go:262] [ 620: 620] Allocating stack with size of 8388608 bytes D0712 20:23:43.640907 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.642128 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.642171 30218 usertrap_amd64.go:106] [ 620: 620] Map a usertrap vma at 63000 D0712 20:23:43.642285 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 1 D0712 20:23:43.642321 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:43.642573 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.642599 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 2 D0712 20:23:43.642607 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:43.643419 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.643451 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 3 D0712 20:23:43.643466 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:43.648753 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.648787 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 4 D0712 20:23:43.648804 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:43.649935 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.649958 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 5 D0712 20:23:43.649966 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:43.649998 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.650003 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 6 D0712 20:23:43.650008 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:43.650175 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.650191 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 7 D0712 20:23:43.650196 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:43.650282 30218 usertrap_amd64.go:212] [ 620: 621] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.650292 30218 usertrap_amd64.go:122] [ 620: 621] Allocate a new trap: 0xc0004ec9c0 8 D0712 20:23:43.650300 30218 usertrap_amd64.go:225] [ 620: 621] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:43.650503 30218 usertrap_amd64.go:212] [ 620: 621] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.650530 30218 usertrap_amd64.go:122] [ 620: 621] Allocate a new trap: 0xc0004ec9c0 9 D0712 20:23:43.650542 30218 usertrap_amd64.go:225] [ 620: 621] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:43.650554 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.650560 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 10 D0712 20:23:43.650567 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:43.650618 30218 usertrap_amd64.go:212] [ 620: 623] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.650630 30218 usertrap_amd64.go:122] [ 620: 623] Allocate a new trap: 0xc0004ec9c0 11 D0712 20:23:43.650642 30218 usertrap_amd64.go:225] [ 620: 623] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:43.650994 30218 usertrap_amd64.go:212] [ 620: 621] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.651019 30218 usertrap_amd64.go:122] [ 620: 621] Allocate a new trap: 0xc0004ec9c0 12 D0712 20:23:43.651026 30218 usertrap_amd64.go:225] [ 620: 621] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:43.651054 30218 usertrap_amd64.go:212] [ 620: 621] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.651059 30218 usertrap_amd64.go:122] [ 620: 621] Allocate a new trap: 0xc0004ec9c0 13 D0712 20:23:43.651064 30218 usertrap_amd64.go:225] [ 620: 621] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:43.651103 30218 task_signals.go:470] [ 620: 620] Notified of signal 23 D0712 20:23:43.651141 30218 task_signals.go:220] [ 620: 620] Signal 23: delivering to handler D0712 20:23:43.657105 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.657140 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 14 D0712 20:23:43.657152 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:43.661380 30218 task_signals.go:470] [ 620: 620] Notified of signal 23 D0712 20:23:43.662557 30218 task_signals.go:220] [ 620: 620] Signal 23: delivering to handler I0712 20:23:43.666510 30218 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0712 20:23:43.666626 30218 usertrap_amd64.go:212] [ 620: 620] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.666648 30218 usertrap_amd64.go:122] [ 620: 620] Allocate a new trap: 0xc0004ec9c0 15 D0712 20:23:43.666660 30218 usertrap_amd64.go:225] [ 620: 620] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 20:23:43.666727 30218 task_exit.go:204] [ 620: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.666763 30218 task_exit.go:204] [ 620: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.666787 30218 task_signals.go:204] [ 620: 623] Signal 620, PID: 623, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.666810 30218 task_exit.go:204] [ 620: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.666779 30218 task_signals.go:204] [ 620: 622] Signal 620, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.666831 30218 task_signals.go:204] [ 620: 621] Signal 620, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.666836 30218 task_exit.go:204] [ 620: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.666867 30218 task_exit.go:204] [ 620: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.666884 30218 task_signals.go:204] [ 620: 624] Signal 620, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.666892 30218 task_exit.go:204] [ 620: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.666900 30218 task_exit.go:204] [ 620: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.666904 30218 task_exit.go:204] [ 620: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.666912 30218 task_exit.go:204] [ 620: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.666917 30218 task_exit.go:204] [ 620: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.666930 30218 task_exit.go:204] [ 620: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.666945 30218 task_exit.go:204] [ 620: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.668009 30218 task_exit.go:204] [ 620: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.668049 30218 task_exit.go:204] [ 620: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.668062 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.668094 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.668104 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.668129 30218 task_exit.go:204] [ 620: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.668821 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.670190 30218 syscalls.go:262] [ 625: 625] Allocating stack with size of 8388608 bytes D0712 20:23:43.670349 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.671339 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.671379 30218 usertrap_amd64.go:106] [ 625: 625] Map a usertrap vma at 65000 D0712 20:23:43.671475 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 1 D0712 20:23:43.671510 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:43.671994 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.672015 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 2 D0712 20:23:43.672028 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:43.672702 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.672736 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 3 D0712 20:23:43.672746 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:43.679874 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.679897 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 4 D0712 20:23:43.679908 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:43.681099 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.681128 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 5 D0712 20:23:43.681141 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:43.681213 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.681222 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 6 D0712 20:23:43.681235 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:43.681479 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.681500 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 7 D0712 20:23:43.681508 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:43.681674 30218 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.681714 30218 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc000d99f80 8 D0712 20:23:43.681722 30218 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:43.681931 30218 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.681950 30218 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc000d99f80 9 D0712 20:23:43.681959 30218 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b6e0 trap addr 652d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:43.682065 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.682162 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 10 D0712 20:23:43.682230 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:43.682336 30218 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.682369 30218 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc000d99f80 11 D0712 20:23:43.682383 30218 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46af76 trap addr 65370 ([184 35 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:43.690611 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.690654 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 12 D0712 20:23:43.690670 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:43.692818 30218 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.692864 30218 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc000d99f80 13 D0712 20:23:43.692887 30218 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:43.693143 30218 usertrap_amd64.go:212] [ 625: 626] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.693171 30218 usertrap_amd64.go:122] [ 625: 626] Allocate a new trap: 0xc000d99f80 14 D0712 20:23:43.693183 30218 usertrap_amd64.go:225] [ 625: 626] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:43.693278 30218 task_signals.go:470] [ 625: 625] Notified of signal 23 D0712 20:23:43.693393 30218 task_signals.go:220] [ 625: 625] Signal 23: delivering to handler D0712 20:23:43.700568 30218 sampler.go:191] Time: Adjusting syscall overhead down to 875 I0712 20:23:43.700811 30218 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0712 20:23:43.700909 30218 usertrap_amd64.go:212] [ 625: 625] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.700920 30218 usertrap_amd64.go:122] [ 625: 625] Allocate a new trap: 0xc000d99f80 15 D0712 20:23:43.700931 30218 usertrap_amd64.go:225] [ 625: 625] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0712 20:23:43.701026 30218 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.701061 30218 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.701088 30218 task_signals.go:204] [ 625: 626] Signal 625, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.701115 30218 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.701124 30218 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.701130 30218 task_exit.go:204] [ 625: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.701144 30218 task_signals.go:204] [ 625: 629] Signal 625, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.701171 30218 task_signals.go:204] [ 625: 627] Signal 625, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.701198 30218 task_signals.go:204] [ 625: 628] Signal 625, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.701216 30218 task_exit.go:204] [ 625: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.701250 30218 task_exit.go:204] [ 625: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.701266 30218 task_exit.go:204] [ 625: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.701285 30218 task_exit.go:204] [ 625: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.701342 30218 task_exit.go:204] [ 625: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.701351 30218 task_exit.go:204] [ 625: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.701368 30218 task_exit.go:204] [ 625: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.702665 30218 task_exit.go:204] [ 625: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.702695 30218 task_exit.go:204] [ 625: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.702708 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.702822 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.702854 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.702925 30218 task_exit.go:204] [ 625: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.703632 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.705154 30218 syscalls.go:262] [ 630: 630] Allocating stack with size of 8388608 bytes D0712 20:23:43.705321 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.706760 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.706800 30218 usertrap_amd64.go:106] [ 630: 630] Map a usertrap vma at 68000 D0712 20:23:43.706903 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 1 D0712 20:23:43.706962 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:43.707363 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.707391 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 2 D0712 20:23:43.707406 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:43.708156 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.708181 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 3 D0712 20:23:43.708192 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:43.716675 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.716710 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 4 D0712 20:23:43.716744 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:43.718254 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.718273 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 5 D0712 20:23:43.718281 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:43.718335 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.718355 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 6 D0712 20:23:43.718363 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:43.718567 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.718592 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 7 D0712 20:23:43.718599 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:43.719081 30218 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.719113 30218 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc001a28030 8 D0712 20:23:43.719127 30218 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:43.719427 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.719456 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 9 D0712 20:23:43.719468 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:43.719526 30218 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.719542 30218 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc001a28030 10 D0712 20:23:43.719554 30218 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:43.728890 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.728926 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 11 D0712 20:23:43.728978 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:43.731231 30218 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.731269 30218 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc001a28030 12 D0712 20:23:43.731284 30218 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:43.731328 30218 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.731336 30218 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc001a28030 13 D0712 20:23:43.731344 30218 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:43.731372 30218 task_signals.go:470] [ 630: 630] Notified of signal 23 D0712 20:23:43.731422 30218 task_signals.go:220] [ 630: 630] Signal 23: delivering to handler I0712 20:23:43.741696 30218 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0712 20:23:43.741832 30218 usertrap_amd64.go:212] [ 630: 631] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.741859 30218 usertrap_amd64.go:122] [ 630: 631] Allocate a new trap: 0xc001a28030 14 D0712 20:23:43.741873 30218 usertrap_amd64.go:225] [ 630: 631] Apply the binary patch addr 46b6e0 trap addr 68460 ([184 24 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:43.741927 30218 usertrap_amd64.go:212] [ 630: 630] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.741934 30218 usertrap_amd64.go:122] [ 630: 630] Allocate a new trap: 0xc001a28030 15 D0712 20:23:43.741941 30218 usertrap_amd64.go:225] [ 630: 630] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 20:23:43.742016 30218 task_signals.go:470] [ 630: 630] Notified of signal 23 D0712 20:23:43.742052 30218 task_exit.go:204] [ 630: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.742077 30218 task_signals.go:204] [ 630: 631] Signal 630, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.742096 30218 task_exit.go:204] [ 630: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.742116 30218 task_signals.go:204] [ 630: 632] Signal 630, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.742122 30218 task_exit.go:204] [ 630: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.742126 30218 task_exit.go:204] [ 630: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.742129 30218 task_exit.go:204] [ 630: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.742138 30218 task_exit.go:204] [ 630: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.742145 30218 task_exit.go:204] [ 630: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.742149 30218 task_exit.go:204] [ 630: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.742158 30218 task_signals.go:204] [ 630: 633] Signal 630, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.742164 30218 task_exit.go:204] [ 630: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.742168 30218 task_exit.go:204] [ 630: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.742171 30218 task_exit.go:204] [ 630: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.742180 30218 task_signals.go:204] [ 630: 634] Signal 630, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.742189 30218 task_exit.go:204] [ 630: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.743378 30218 task_exit.go:204] [ 630: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.743416 30218 task_exit.go:204] [ 630: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.743430 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.743501 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.743530 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.743658 30218 task_exit.go:204] [ 630: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.744049 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.745488 30218 syscalls.go:262] [ 635: 635] Allocating stack with size of 8388608 bytes D0712 20:23:43.745604 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.750372 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.750432 30218 usertrap_amd64.go:106] [ 635: 635] Map a usertrap vma at 61000 D0712 20:23:43.750530 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 1 D0712 20:23:43.750565 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:43.751005 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.751034 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 2 D0712 20:23:43.751045 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:43.751804 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.751828 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 3 D0712 20:23:43.751841 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:43.759800 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.759841 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 4 D0712 20:23:43.759854 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:43.761090 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.761183 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 5 D0712 20:23:43.761206 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:43.761260 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.761266 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 6 D0712 20:23:43.761276 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:43.761470 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.761484 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 7 D0712 20:23:43.761492 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:43.761629 30218 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.761648 30218 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0019c60c0 8 D0712 20:23:43.761657 30218 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:43.761862 30218 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.761888 30218 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0019c60c0 9 D0712 20:23:43.761899 30218 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:43.761921 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.761929 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 10 D0712 20:23:43.761938 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:43.762093 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:43.762116 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 11 D0712 20:23:43.762126 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:43.770493 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.770521 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 12 D0712 20:23:43.770535 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:43.773036 30218 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.773079 30218 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0019c60c0 13 D0712 20:23:43.773096 30218 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:43.773297 30218 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.773324 30218 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0019c60c0 14 D0712 20:23:43.773334 30218 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:43.773445 30218 task_signals.go:470] [ 635: 635] Notified of signal 23 D0712 20:23:43.773561 30218 task_signals.go:220] [ 635: 635] Signal 23: delivering to handler I0712 20:23:43.781216 30218 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0712 20:23:43.781309 30218 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.781330 30218 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0019c60c0 15 D0712 20:23:43.781344 30218 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 20:23:43.781407 30218 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.781430 30218 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.781456 30218 task_signals.go:204] [ 635: 638] Signal 635, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.781447 30218 task_signals.go:204] [ 635: 637] Signal 635, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.781468 30218 task_exit.go:204] [ 635: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.781513 30218 task_exit.go:204] [ 635: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.781521 30218 task_exit.go:204] [ 635: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.781541 30218 task_signals.go:204] [ 635: 636] Signal 635, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.781564 30218 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.781604 30218 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.781610 30218 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.781546 30218 task_signals.go:204] [ 635: 639] Signal 635, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.781621 30218 task_exit.go:204] [ 635: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.781635 30218 task_exit.go:204] [ 635: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.781641 30218 task_exit.go:204] [ 635: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.781651 30218 task_exit.go:204] [ 635: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.782719 30218 task_exit.go:204] [ 635: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.782746 30218 task_exit.go:204] [ 635: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.782758 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.782801 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.782814 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.782911 30218 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.783861 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.785343 30218 syscalls.go:262] [ 640: 640] Allocating stack with size of 8388608 bytes D0712 20:23:43.785465 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.787088 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.787125 30218 usertrap_amd64.go:106] [ 640: 640] Map a usertrap vma at 61000 D0712 20:23:43.787188 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 1 D0712 20:23:43.787290 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:43.787683 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.787708 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 2 D0712 20:23:43.787721 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:43.788244 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.788278 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 3 D0712 20:23:43.788293 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:43.795384 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.795429 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 4 D0712 20:23:43.795448 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:43.796702 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.796732 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 5 D0712 20:23:43.796741 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:43.796784 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.796789 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 6 D0712 20:23:43.796795 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:43.797237 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.797263 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 7 D0712 20:23:43.797276 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:43.797398 30218 usertrap_amd64.go:212] [ 640: 641] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.797412 30218 usertrap_amd64.go:122] [ 640: 641] Allocate a new trap: 0xc000ecd3b0 8 D0712 20:23:43.797419 30218 usertrap_amd64.go:225] [ 640: 641] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:43.800138 30218 usertrap_amd64.go:212] [ 640: 641] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.800164 30218 usertrap_amd64.go:122] [ 640: 641] Allocate a new trap: 0xc000ecd3b0 9 D0712 20:23:43.800177 30218 usertrap_amd64.go:225] [ 640: 641] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:43.800359 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.800443 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 10 D0712 20:23:43.800473 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:43.802371 30218 usertrap_amd64.go:212] [ 640: 641] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.804008 30218 usertrap_amd64.go:122] [ 640: 641] Allocate a new trap: 0xc000ecd3b0 11 D0712 20:23:43.804079 30218 usertrap_amd64.go:225] [ 640: 641] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:43.804566 30218 usertrap_amd64.go:212] [ 640: 641] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.804592 30218 usertrap_amd64.go:122] [ 640: 641] Allocate a new trap: 0xc000ecd3b0 12 D0712 20:23:43.804605 30218 usertrap_amd64.go:225] [ 640: 641] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:43.804645 30218 task_signals.go:470] [ 640: 640] Notified of signal 23 D0712 20:23:43.809078 30218 task_signals.go:220] [ 640: 640] Signal 23: delivering to handler D0712 20:23:43.813678 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.813715 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 13 D0712 20:23:43.813728 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:43.815979 30218 task_signals.go:470] [ 640: 640] Notified of signal 23 D0712 20:23:43.816039 30218 task_signals.go:179] [ 640: 640] Restarting syscall 202: interrupted by signal 23 D0712 20:23:43.816058 30218 task_signals.go:220] [ 640: 640] Signal 23: delivering to handler I0712 20:23:43.824199 30218 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0712 20:23:43.824287 30218 usertrap_amd64.go:212] [ 640: 640] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.824305 30218 usertrap_amd64.go:122] [ 640: 640] Allocate a new trap: 0xc000ecd3b0 14 D0712 20:23:43.824317 30218 usertrap_amd64.go:225] [ 640: 640] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:43.824400 30218 task_exit.go:204] [ 640: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.824443 30218 task_exit.go:204] [ 640: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.824477 30218 task_signals.go:204] [ 640: 641] Signal 640, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.824487 30218 task_exit.go:204] [ 640: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.824493 30218 task_exit.go:204] [ 640: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.824496 30218 task_exit.go:204] [ 640: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.824510 30218 task_signals.go:204] [ 640: 642] Signal 640, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.824518 30218 task_exit.go:204] [ 640: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.824526 30218 task_exit.go:204] [ 640: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.824532 30218 task_exit.go:204] [ 640: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.824545 30218 task_signals.go:204] [ 640: 644] Signal 640, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.824566 30218 task_exit.go:204] [ 640: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.824575 30218 task_exit.go:204] [ 640: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.824585 30218 task_exit.go:204] [ 640: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.824545 30218 task_signals.go:204] [ 640: 643] Signal 640, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.824599 30218 task_exit.go:204] [ 640: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.825947 30218 task_exit.go:204] [ 640: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.825982 30218 task_exit.go:204] [ 640: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.825997 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.826025 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.826050 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.826258 30218 task_exit.go:204] [ 640: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.827007 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.828792 30218 syscalls.go:262] [ 645: 645] Allocating stack with size of 8388608 bytes D0712 20:23:43.829000 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.831941 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.831986 30218 usertrap_amd64.go:106] [ 645: 645] Map a usertrap vma at 68000 D0712 20:23:43.832076 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 1 D0712 20:23:43.832140 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:43.832476 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.832603 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 2 D0712 20:23:43.832630 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:43.833151 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.833180 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 3 D0712 20:23:43.833191 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:43.838922 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.838959 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 4 D0712 20:23:43.838972 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:43.840057 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.840084 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 5 D0712 20:23:43.840095 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:43.840154 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.840171 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 6 D0712 20:23:43.840179 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:43.840375 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.840398 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 7 D0712 20:23:43.840409 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:43.840577 30218 usertrap_amd64.go:212] [ 645: 646] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.840608 30218 usertrap_amd64.go:122] [ 645: 646] Allocate a new trap: 0xc001a28030 8 D0712 20:23:43.840621 30218 usertrap_amd64.go:225] [ 645: 646] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:43.840819 30218 usertrap_amd64.go:212] [ 645: 646] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.840843 30218 usertrap_amd64.go:122] [ 645: 646] Allocate a new trap: 0xc001a28030 9 D0712 20:23:43.840854 30218 usertrap_amd64.go:225] [ 645: 646] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:43.840975 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.841001 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 10 D0712 20:23:43.841013 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:43.848225 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.848253 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 11 D0712 20:23:43.848265 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:43.851419 30218 usertrap_amd64.go:212] [ 645: 646] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.851505 30218 usertrap_amd64.go:122] [ 645: 646] Allocate a new trap: 0xc001a28030 12 D0712 20:23:43.851526 30218 usertrap_amd64.go:225] [ 645: 646] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:43.851606 30218 usertrap_amd64.go:212] [ 645: 646] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.851630 30218 usertrap_amd64.go:122] [ 645: 646] Allocate a new trap: 0xc001a28030 13 D0712 20:23:43.851640 30218 usertrap_amd64.go:225] [ 645: 646] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:43.851754 30218 task_signals.go:470] [ 645: 645] Notified of signal 23 D0712 20:23:43.851845 30218 task_signals.go:220] [ 645: 645] Signal 23: delivering to handler D0712 20:23:43.859464 30218 usertrap_amd64.go:212] [ 645: 645] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.859495 30218 usertrap_amd64.go:122] [ 645: 645] Allocate a new trap: 0xc001a28030 14 D0712 20:23:43.859510 30218 usertrap_amd64.go:225] [ 645: 645] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:43.859586 30218 task_exit.go:204] [ 645: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.859626 30218 task_exit.go:204] [ 645: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.859630 30218 task_signals.go:204] [ 645: 649] Signal 645, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.859645 30218 task_exit.go:204] [ 645: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.859654 30218 task_exit.go:204] [ 645: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.859660 30218 task_exit.go:204] [ 645: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.859675 30218 task_signals.go:204] [ 645: 647] Signal 645, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.859695 30218 task_signals.go:204] [ 645: 648] Signal 645, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.859704 30218 task_exit.go:204] [ 645: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.859719 30218 task_exit.go:204] [ 645: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.859757 30218 task_signals.go:204] [ 645: 646] Signal 645, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.859783 30218 task_exit.go:204] [ 645: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.859790 30218 task_exit.go:204] [ 645: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.859809 30218 task_exit.go:204] [ 645: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.859830 30218 task_exit.go:204] [ 645: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.859862 30218 task_exit.go:204] [ 645: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.861102 30218 task_exit.go:204] [ 645: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.861118 30218 task_exit.go:204] [ 645: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.861194 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.861295 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.861347 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.861483 30218 task_exit.go:204] [ 645: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.862024 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.863203 30218 syscalls.go:262] [ 650: 650] Allocating stack with size of 8388608 bytes D0712 20:23:43.863289 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.869357 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.869438 30218 usertrap_amd64.go:106] [ 650: 650] Map a usertrap vma at 62000 D0712 20:23:43.869539 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 1 D0712 20:23:43.869569 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:43.869800 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.869813 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 2 D0712 20:23:43.869819 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:43.870241 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.870260 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 3 D0712 20:23:43.870267 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:43.876748 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.876793 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 4 D0712 20:23:43.876809 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:43.878127 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.878173 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 5 D0712 20:23:43.878188 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:43.878302 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.878325 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 6 D0712 20:23:43.878334 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:43.878712 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.878729 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 7 D0712 20:23:43.878736 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:43.878930 30218 usertrap_amd64.go:212] [ 650: 651] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.878961 30218 usertrap_amd64.go:122] [ 650: 651] Allocate a new trap: 0xc0004ec330 8 D0712 20:23:43.878975 30218 usertrap_amd64.go:225] [ 650: 651] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:43.879277 30218 usertrap_amd64.go:212] [ 650: 651] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.879297 30218 usertrap_amd64.go:122] [ 650: 651] Allocate a new trap: 0xc0004ec330 9 D0712 20:23:43.879309 30218 usertrap_amd64.go:225] [ 650: 651] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:43.879321 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.879328 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 10 D0712 20:23:43.879336 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:43.886900 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.886932 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 11 D0712 20:23:43.886945 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:43.889538 30218 usertrap_amd64.go:212] [ 650: 651] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.889569 30218 usertrap_amd64.go:122] [ 650: 651] Allocate a new trap: 0xc0004ec330 12 D0712 20:23:43.889582 30218 usertrap_amd64.go:225] [ 650: 651] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:43.889599 30218 usertrap_amd64.go:212] [ 650: 651] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.889606 30218 usertrap_amd64.go:122] [ 650: 651] Allocate a new trap: 0xc0004ec330 13 D0712 20:23:43.889614 30218 usertrap_amd64.go:225] [ 650: 651] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:43.889631 30218 task_signals.go:470] [ 650: 650] Notified of signal 23 D0712 20:23:43.889704 30218 task_signals.go:220] [ 650: 650] Signal 23: delivering to handler I0712 20:23:43.897161 30218 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0712 20:23:43.897265 30218 usertrap_amd64.go:212] [ 650: 650] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.897280 30218 usertrap_amd64.go:122] [ 650: 650] Allocate a new trap: 0xc0004ec330 14 D0712 20:23:43.897292 30218 usertrap_amd64.go:225] [ 650: 650] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:43.897479 30218 task_exit.go:204] [ 650: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.897590 30218 task_exit.go:204] [ 650: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.897619 30218 task_signals.go:204] [ 650: 652] Signal 650, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.897630 30218 task_exit.go:204] [ 650: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.897635 30218 task_exit.go:204] [ 650: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.897639 30218 task_exit.go:204] [ 650: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.897649 30218 task_signals.go:204] [ 650: 651] Signal 650, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.897659 30218 task_exit.go:204] [ 650: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.897667 30218 task_exit.go:204] [ 650: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.897682 30218 task_exit.go:204] [ 650: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.897693 30218 task_signals.go:204] [ 650: 654] Signal 650, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.897710 30218 task_exit.go:204] [ 650: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.897715 30218 task_exit.go:204] [ 650: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.897720 30218 task_exit.go:204] [ 650: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.897754 30218 task_signals.go:204] [ 650: 653] Signal 650, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.897767 30218 task_exit.go:204] [ 650: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.898963 30218 task_exit.go:204] [ 650: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.899036 30218 task_exit.go:204] [ 650: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.899075 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.899146 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.899202 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.899283 30218 task_exit.go:204] [ 650: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.899834 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.901140 30218 syscalls.go:262] [ 655: 655] Allocating stack with size of 8388608 bytes D0712 20:23:43.901248 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.902240 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.902380 30218 usertrap_amd64.go:106] [ 655: 655] Map a usertrap vma at 67000 D0712 20:23:43.902476 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 1 D0712 20:23:43.902510 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:43.903572 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.903598 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 2 D0712 20:23:43.903612 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:43.904318 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.904355 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 3 D0712 20:23:43.904366 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:43.910306 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.910338 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 4 D0712 20:23:43.910346 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:43.911560 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.911591 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 5 D0712 20:23:43.911602 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:43.911641 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.911649 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 6 D0712 20:23:43.911655 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:43.911813 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.911836 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 7 D0712 20:23:43.911843 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:43.912000 30218 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.912037 30218 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc000db20f0 8 D0712 20:23:43.912052 30218 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:43.912212 30218 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.912236 30218 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc000db20f0 9 D0712 20:23:43.912244 30218 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:43.912258 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.912264 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 10 D0712 20:23:43.912271 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:43.921904 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.921943 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 11 D0712 20:23:43.921958 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:43.924614 30218 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.924647 30218 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc000db20f0 12 D0712 20:23:43.924660 30218 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:43.924725 30218 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.924802 30218 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc000db20f0 13 D0712 20:23:43.924864 30218 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:43.925025 30218 task_signals.go:470] [ 655: 655] Notified of signal 23 D0712 20:23:43.925145 30218 task_signals.go:220] [ 655: 655] Signal 23: delivering to handler I0712 20:23:43.934608 30218 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0712 20:23:43.934690 30218 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.934704 30218 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc000db20f0 14 D0712 20:23:43.934715 30218 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:43.934770 30218 task_exit.go:204] [ 655: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.934800 30218 task_exit.go:204] [ 655: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.934818 30218 task_signals.go:204] [ 655: 659] Signal 655, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.934818 30218 task_signals.go:204] [ 655: 658] Signal 655, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.934835 30218 task_signals.go:204] [ 655: 657] Signal 655, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.934850 30218 task_exit.go:204] [ 655: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.934874 30218 task_signals.go:204] [ 655: 656] Signal 655, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.934892 30218 task_exit.go:204] [ 655: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.934898 30218 task_exit.go:204] [ 655: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.934913 30218 task_exit.go:204] [ 655: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.934929 30218 task_exit.go:204] [ 655: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.934936 30218 task_exit.go:204] [ 655: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.934948 30218 task_exit.go:204] [ 655: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.934957 30218 task_exit.go:204] [ 655: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.934963 30218 task_exit.go:204] [ 655: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.934982 30218 task_exit.go:204] [ 655: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.936110 30218 task_exit.go:204] [ 655: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.936140 30218 task_exit.go:204] [ 655: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.936155 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.936204 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.936224 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.936365 30218 task_exit.go:204] [ 655: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.937164 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.938845 30218 syscalls.go:262] [ 660: 660] Allocating stack with size of 8388608 bytes D0712 20:23:43.939079 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.940361 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.940401 30218 usertrap_amd64.go:106] [ 660: 660] Map a usertrap vma at 69000 D0712 20:23:43.940478 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 1 D0712 20:23:43.940514 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:43.940922 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.940979 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 2 D0712 20:23:43.940992 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:43.941449 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.941488 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 3 D0712 20:23:43.941496 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:43.947651 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.947683 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 4 D0712 20:23:43.947693 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:43.949088 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.949116 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 5 D0712 20:23:43.949129 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:43.949180 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.949191 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 6 D0712 20:23:43.949197 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:43.949354 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.949368 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 7 D0712 20:23:43.949373 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:43.949477 30218 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.949488 30218 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc0004eccf0 8 D0712 20:23:43.949494 30218 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:43.949618 30218 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.949694 30218 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc0004eccf0 9 D0712 20:23:43.949718 30218 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:43.949789 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.949820 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 10 D0712 20:23:43.949829 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:43.957756 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.957790 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 11 D0712 20:23:43.957804 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:43.960372 30218 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.960403 30218 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc0004eccf0 12 D0712 20:23:43.960417 30218 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:43.960477 30218 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.960493 30218 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc0004eccf0 13 D0712 20:23:43.960504 30218 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:43.960535 30218 task_signals.go:470] [ 660: 660] Notified of signal 23 D0712 20:23:43.960580 30218 task_signals.go:220] [ 660: 660] Signal 23: delivering to handler I0712 20:23:43.967775 30218 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0712 20:23:43.967876 30218 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.967890 30218 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc0004eccf0 14 D0712 20:23:43.967901 30218 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:43.967957 30218 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.967991 30218 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.968015 30218 task_signals.go:204] [ 660: 661] Signal 660, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.968031 30218 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.968028 30218 task_signals.go:204] [ 660: 663] Signal 660, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.968038 30218 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.968043 30218 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.968055 30218 task_exit.go:204] [ 660: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.968054 30218 task_signals.go:204] [ 660: 664] Signal 660, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.968061 30218 task_exit.go:204] [ 660: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.968066 30218 task_exit.go:204] [ 660: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.968093 30218 task_signals.go:204] [ 660: 662] Signal 660, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.968108 30218 task_exit.go:204] [ 660: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.968142 30218 task_exit.go:204] [ 660: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.968163 30218 task_exit.go:204] [ 660: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.968178 30218 task_exit.go:204] [ 660: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.969336 30218 task_exit.go:204] [ 660: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.969364 30218 task_exit.go:204] [ 660: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.969378 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:43.969417 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:43.969452 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:43.969513 30218 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.970069 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.971360 30218 syscalls.go:262] [ 665: 665] Allocating stack with size of 8388608 bytes D0712 20:23:43.971625 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:43.972743 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:43.972787 30218 usertrap_amd64.go:106] [ 665: 665] Map a usertrap vma at 64000 D0712 20:23:43.972978 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 1 D0712 20:23:43.973065 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:43.973365 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:43.973418 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 2 D0712 20:23:43.973431 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:43.973894 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:43.973918 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 3 D0712 20:23:43.973930 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:43.980338 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:43.980448 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 4 D0712 20:23:43.980475 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:43.981868 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:43.981898 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 5 D0712 20:23:43.981910 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:43.982011 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b214:sysno 13 D0712 20:23:43.982017 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 6 D0712 20:23:43.982023 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:43.982212 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:43.982239 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 7 D0712 20:23:43.982250 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:43.982401 30218 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:43.982415 30218 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0004ed170 8 D0712 20:23:43.982423 30218 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:43.982609 30218 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46af76:sysno 35 D0712 20:23:43.982682 30218 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0004ed170 9 D0712 20:23:43.982746 30218 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:43.982920 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:43.982968 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 10 D0712 20:23:43.982981 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:43.989702 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46af29:sysno 293 D0712 20:23:43.989730 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 11 D0712 20:23:43.989742 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:43.993502 30218 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b020:sysno 39 D0712 20:23:43.993531 30218 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0004ed170 12 D0712 20:23:43.993544 30218 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:43.993606 30218 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:43.993628 30218 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0004ed170 13 D0712 20:23:43.993659 30218 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:43.993711 30218 task_signals.go:470] [ 665: 665] Notified of signal 23 D0712 20:23:43.993779 30218 task_signals.go:220] [ 665: 665] Signal 23: delivering to handler D0712 20:23:43.999098 30218 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:43.999128 30218 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0004ed170 14 D0712 20:23:43.999143 30218 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:43.999188 30218 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.999219 30218 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.999235 30218 task_signals.go:204] [ 665: 669] Signal 665, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.999255 30218 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.999253 30218 task_signals.go:204] [ 665: 667] Signal 665, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.999261 30218 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.999273 30218 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.999236 30218 task_signals.go:204] [ 665: 668] Signal 665, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.999311 30218 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.999321 30218 task_signals.go:204] [ 665: 666] Signal 665, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:43.999334 30218 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.999341 30218 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.999350 30218 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:43.999373 30218 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:43.999383 30218 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:43.999391 30218 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.000535 30218 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.000564 30218 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.000578 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.000635 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.000655 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.000736 30218 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.001308 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.002394 30218 syscalls.go:262] [ 670: 670] Allocating stack with size of 8388608 bytes D0712 20:23:44.002494 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.004704 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.004735 30218 usertrap_amd64.go:106] [ 670: 670] Map a usertrap vma at 62000 D0712 20:23:44.004832 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 1 D0712 20:23:44.004858 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:44.005384 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.005407 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 2 D0712 20:23:44.005417 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:44.005779 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.005798 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 3 D0712 20:23:44.005809 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:44.010904 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.010940 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 4 D0712 20:23:44.010953 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:44.012023 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.012051 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 5 D0712 20:23:44.012062 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:44.012115 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.012152 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 6 D0712 20:23:44.012161 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:44.012585 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.012629 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 7 D0712 20:23:44.012640 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:44.012816 30218 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.012839 30218 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc000db2750 8 D0712 20:23:44.012870 30218 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:44.013058 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.013082 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 9 D0712 20:23:44.013091 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:44.013243 30218 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.013269 30218 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc000db2750 10 D0712 20:23:44.013280 30218 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:44.013290 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:44.013297 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 11 D0712 20:23:44.013304 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:44.020101 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.020135 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 12 D0712 20:23:44.020149 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:44.024179 30218 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.024217 30218 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc000db2750 13 D0712 20:23:44.024230 30218 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:44.024277 30218 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.024294 30218 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc000db2750 14 D0712 20:23:44.024302 30218 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:44.024319 30218 task_signals.go:470] [ 670: 670] Notified of signal 23 D0712 20:23:44.024404 30218 task_signals.go:220] [ 670: 670] Signal 23: delivering to handler D0712 20:23:44.029993 30218 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.030032 30218 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc000db2750 15 D0712 20:23:44.030046 30218 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0712 20:23:44.030106 30218 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.030133 30218 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.030160 30218 task_signals.go:204] [ 670: 673] Signal 670, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.030180 30218 task_exit.go:204] [ 670: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.030154 30218 task_signals.go:204] [ 670: 672] Signal 670, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.030190 30218 task_exit.go:204] [ 670: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.030176 30218 task_signals.go:204] [ 670: 671] Signal 670, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.030196 30218 task_exit.go:204] [ 670: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.030163 30218 task_signals.go:204] [ 670: 674] Signal 670, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.030212 30218 task_exit.go:204] [ 670: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.030219 30218 task_exit.go:204] [ 670: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.030224 30218 task_exit.go:204] [ 670: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.030233 30218 task_exit.go:204] [ 670: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.030240 30218 task_exit.go:204] [ 670: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.030245 30218 task_exit.go:204] [ 670: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.030254 30218 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.031375 30218 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.031403 30218 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.031418 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.032602 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.032632 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.032766 30218 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.033309 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.034983 30218 syscalls.go:262] [ 675: 675] Allocating stack with size of 8388608 bytes D0712 20:23:44.035304 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.036188 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.036232 30218 usertrap_amd64.go:106] [ 675: 675] Map a usertrap vma at 61000 D0712 20:23:44.036291 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 1 D0712 20:23:44.036370 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:44.036795 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.036926 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 2 D0712 20:23:44.037024 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:44.037571 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.037595 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 3 D0712 20:23:44.037606 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:44.043388 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.043419 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 4 D0712 20:23:44.043429 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:44.044407 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.044451 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 5 D0712 20:23:44.044463 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:44.044527 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.044555 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 6 D0712 20:23:44.044566 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:44.044834 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.044862 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 7 D0712 20:23:44.044874 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:44.045070 30218 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.045095 30218 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc0015a2db0 8 D0712 20:23:44.045105 30218 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:44.045540 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.045615 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 9 D0712 20:23:44.045641 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:44.045659 30218 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.045666 30218 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc0015a2db0 10 D0712 20:23:44.045742 30218 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:44.052742 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.052775 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 11 D0712 20:23:44.052790 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:44.057003 30218 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.057046 30218 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc0015a2db0 12 D0712 20:23:44.057059 30218 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:44.057109 30218 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.057117 30218 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc0015a2db0 13 D0712 20:23:44.057124 30218 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:44.057140 30218 task_signals.go:470] [ 675: 675] Notified of signal 23 D0712 20:23:44.057194 30218 task_signals.go:220] [ 675: 675] Signal 23: delivering to handler D0712 20:23:44.063167 30218 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.063196 30218 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc0015a2db0 14 D0712 20:23:44.063211 30218 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:44.063278 30218 task_exit.go:204] [ 675: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.063304 30218 task_exit.go:204] [ 675: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.063409 30218 task_signals.go:204] [ 675: 678] Signal 675, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.063535 30218 task_exit.go:204] [ 675: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.063564 30218 task_exit.go:204] [ 675: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.063571 30218 task_exit.go:204] [ 675: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.063437 30218 task_signals.go:204] [ 675: 677] Signal 675, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.063585 30218 task_exit.go:204] [ 675: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.063591 30218 task_exit.go:204] [ 675: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.063594 30218 task_exit.go:204] [ 675: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.063462 30218 task_signals.go:204] [ 675: 679] Signal 675, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.063605 30218 task_exit.go:204] [ 675: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.063329 30218 task_signals.go:204] [ 675: 676] Signal 675, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.063619 30218 task_exit.go:204] [ 675: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.063624 30218 task_exit.go:204] [ 675: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.063641 30218 task_exit.go:204] [ 675: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.064680 30218 task_exit.go:204] [ 675: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.064715 30218 task_exit.go:204] [ 675: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.064728 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.064760 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.064821 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.064886 30218 task_exit.go:204] [ 675: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.065455 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.066473 30218 syscalls.go:262] [ 680: 680] Allocating stack with size of 8388608 bytes D0712 20:23:44.066591 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.068026 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.068062 30218 usertrap_amd64.go:106] [ 680: 680] Map a usertrap vma at 62000 D0712 20:23:44.068126 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 1 D0712 20:23:44.068152 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:44.068512 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.068533 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 2 D0712 20:23:44.068564 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:44.069273 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.069290 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 3 D0712 20:23:44.069298 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:44.073578 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.073601 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 4 D0712 20:23:44.073611 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:44.074740 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.074790 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 5 D0712 20:23:44.074806 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:44.074888 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.074912 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 6 D0712 20:23:44.074924 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:44.075422 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.075479 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 7 D0712 20:23:44.075493 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:44.075642 30218 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.075658 30218 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc0015a2f60 8 D0712 20:23:44.075668 30218 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:44.075838 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.075917 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 9 D0712 20:23:44.075944 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:44.075985 30218 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.075992 30218 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc0015a2f60 10 D0712 20:23:44.076011 30218 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:44.082550 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.082575 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 11 D0712 20:23:44.082585 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:44.086739 30218 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.086758 30218 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc0015a2f60 12 D0712 20:23:44.086772 30218 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:44.086825 30218 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.086860 30218 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc0015a2f60 13 D0712 20:23:44.086871 30218 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:44.086920 30218 task_signals.go:470] [ 680: 680] Notified of signal 23 D0712 20:23:44.087082 30218 task_signals.go:220] [ 680: 680] Signal 23: delivering to handler D0712 20:23:44.092184 30218 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.092210 30218 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc0015a2f60 14 D0712 20:23:44.092219 30218 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:44.092267 30218 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.092294 30218 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.092320 30218 task_signals.go:204] [ 680: 683] Signal 680, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.092366 30218 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.092341 30218 task_signals.go:204] [ 680: 682] Signal 680, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.092387 30218 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.092403 30218 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.092461 30218 task_signals.go:204] [ 680: 685] Signal 680, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.092475 30218 task_signals.go:204] [ 680: 681] Signal 680, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.092495 30218 task_exit.go:204] [ 680: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.092507 30218 task_signals.go:204] [ 680: 684] Signal 680, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.092544 30218 task_exit.go:204] [ 680: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.092555 30218 task_exit.go:204] [ 680: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.092565 30218 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.092581 30218 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.092587 30218 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.092638 30218 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.092647 30218 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.092653 30218 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.092662 30218 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.093835 30218 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.093866 30218 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.093882 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.093916 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.093941 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.094102 30218 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.094617 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.096025 30218 syscalls.go:262] [ 686: 686] Allocating stack with size of 8388608 bytes D0712 20:23:44.096155 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.097285 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.097323 30218 usertrap_amd64.go:106] [ 686: 686] Map a usertrap vma at 61000 D0712 20:23:44.097489 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 1 D0712 20:23:44.097518 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:44.097807 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.097830 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 2 D0712 20:23:44.097839 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:44.098687 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.098733 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 3 D0712 20:23:44.098747 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:44.104025 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.104064 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 4 D0712 20:23:44.104075 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:44.105245 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.105274 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 5 D0712 20:23:44.105285 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:44.105348 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.105366 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 6 D0712 20:23:44.105371 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:44.105744 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.105765 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 7 D0712 20:23:44.105774 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:44.105972 30218 usertrap_amd64.go:212] [ 686: 687] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.105992 30218 usertrap_amd64.go:122] [ 686: 687] Allocate a new trap: 0xc001a80b70 8 D0712 20:23:44.106001 30218 usertrap_amd64.go:225] [ 686: 687] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:44.106241 30218 usertrap_amd64.go:212] [ 686: 687] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.106268 30218 usertrap_amd64.go:122] [ 686: 687] Allocate a new trap: 0xc001a80b70 9 D0712 20:23:44.106281 30218 usertrap_amd64.go:225] [ 686: 687] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:44.106293 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.106324 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 10 D0712 20:23:44.106347 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:44.106446 30218 usertrap_amd64.go:212] [ 686: 687] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.106475 30218 usertrap_amd64.go:122] [ 686: 687] Allocate a new trap: 0xc001a80b70 11 D0712 20:23:44.106490 30218 usertrap_amd64.go:225] [ 686: 687] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:44.106552 30218 usertrap_amd64.go:212] [ 686: 687] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.106575 30218 usertrap_amd64.go:122] [ 686: 687] Allocate a new trap: 0xc001a80b70 12 D0712 20:23:44.106586 30218 usertrap_amd64.go:225] [ 686: 687] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:44.106667 30218 task_signals.go:470] [ 686: 689] Notified of signal 23 D0712 20:23:44.106720 30218 task_signals.go:220] [ 686: 689] Signal 23: delivering to handler D0712 20:23:44.114080 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.114109 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 13 D0712 20:23:44.114119 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:44.117541 30218 task_signals.go:470] [ 686: 686] Notified of signal 23 D0712 20:23:44.117592 30218 task_signals.go:220] [ 686: 686] Signal 23: delivering to handler D0712 20:23:44.124348 30218 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.124414 30218 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc001a80b70 14 D0712 20:23:44.124434 30218 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:44.124512 30218 task_exit.go:204] [ 686: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.124545 30218 task_exit.go:204] [ 686: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.124592 30218 task_signals.go:204] [ 686: 690] Signal 686, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.124622 30218 task_signals.go:204] [ 686: 687] Signal 686, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.124605 30218 task_signals.go:204] [ 686: 688] Signal 686, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.124643 30218 task_exit.go:204] [ 686: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.124660 30218 task_signals.go:204] [ 686: 689] Signal 686, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.124679 30218 task_exit.go:204] [ 686: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.124705 30218 task_exit.go:204] [ 686: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.124719 30218 task_exit.go:204] [ 686: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.124734 30218 task_exit.go:204] [ 686: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.124773 30218 task_exit.go:204] [ 686: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.124793 30218 task_exit.go:204] [ 686: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.124808 30218 task_exit.go:204] [ 686: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.124826 30218 task_exit.go:204] [ 686: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.124836 30218 task_exit.go:204] [ 686: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.126225 30218 task_exit.go:204] [ 686: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.126338 30218 task_exit.go:204] [ 686: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.126362 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.126422 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.126451 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.126486 30218 task_exit.go:204] [ 686: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.127026 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.128592 30218 syscalls.go:262] [ 691: 691] Allocating stack with size of 8388608 bytes D0712 20:23:44.128705 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.134066 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.134152 30218 usertrap_amd64.go:106] [ 691: 691] Map a usertrap vma at 61000 D0712 20:23:44.134258 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 1 D0712 20:23:44.134326 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:44.134694 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.134730 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 2 D0712 20:23:44.134742 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:44.135518 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.135550 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 3 D0712 20:23:44.135567 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:44.142785 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.142824 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 4 D0712 20:23:44.142836 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:44.143962 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.143983 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 5 D0712 20:23:44.143995 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:44.144105 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.144143 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 6 D0712 20:23:44.144150 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:44.144353 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.144367 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 7 D0712 20:23:44.144375 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:44.144493 30218 usertrap_amd64.go:212] [ 691: 692] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.144523 30218 usertrap_amd64.go:122] [ 691: 692] Allocate a new trap: 0xc0015a3350 8 D0712 20:23:44.144536 30218 usertrap_amd64.go:225] [ 691: 692] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:44.144706 30218 usertrap_amd64.go:212] [ 691: 692] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.144734 30218 usertrap_amd64.go:122] [ 691: 692] Allocate a new trap: 0xc0015a3350 9 D0712 20:23:44.144744 30218 usertrap_amd64.go:225] [ 691: 692] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:44.144861 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.144887 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 10 D0712 20:23:44.144898 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:44.145009 30218 usertrap_amd64.go:212] [ 691: 692] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.145096 30218 usertrap_amd64.go:122] [ 691: 692] Allocate a new trap: 0xc0015a3350 11 D0712 20:23:44.145127 30218 usertrap_amd64.go:225] [ 691: 692] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:44.145187 30218 usertrap_amd64.go:212] [ 691: 692] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.145209 30218 usertrap_amd64.go:122] [ 691: 692] Allocate a new trap: 0xc0015a3350 12 D0712 20:23:44.145220 30218 usertrap_amd64.go:225] [ 691: 692] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:44.145269 30218 task_signals.go:470] [ 691: 694] Notified of signal 23 D0712 20:23:44.145307 30218 task_signals.go:179] [ 691: 694] Restarting syscall 202: interrupted by signal 23 D0712 20:23:44.145319 30218 task_signals.go:220] [ 691: 694] Signal 23: delivering to handler D0712 20:23:44.152045 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.152062 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 13 D0712 20:23:44.152071 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:44.155785 30218 task_signals.go:470] [ 691: 691] Notified of signal 23 D0712 20:23:44.156123 30218 task_signals.go:220] [ 691: 691] Signal 23: delivering to handler D0712 20:23:44.163513 30218 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.163573 30218 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc0015a3350 14 D0712 20:23:44.163591 30218 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:44.163649 30218 task_exit.go:204] [ 691: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.163678 30218 task_exit.go:204] [ 691: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.163705 30218 task_signals.go:204] [ 691: 694] Signal 691, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.163731 30218 task_exit.go:204] [ 691: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.163730 30218 task_signals.go:204] [ 691: 695] Signal 691, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.163725 30218 task_signals.go:204] [ 691: 692] Signal 691, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.163740 30218 task_exit.go:204] [ 691: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.163755 30218 task_exit.go:204] [ 691: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.163698 30218 task_signals.go:204] [ 691: 693] Signal 691, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.163774 30218 task_exit.go:204] [ 691: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.163783 30218 task_exit.go:204] [ 691: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.163811 30218 task_exit.go:204] [ 691: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.163829 30218 task_exit.go:204] [ 691: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.163880 30218 task_exit.go:204] [ 691: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.163890 30218 task_exit.go:204] [ 691: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.163908 30218 task_exit.go:204] [ 691: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.165110 30218 task_exit.go:204] [ 691: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.165150 30218 task_exit.go:204] [ 691: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.165173 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.165198 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.165208 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.165264 30218 task_exit.go:204] [ 691: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.165697 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.166875 30218 syscalls.go:262] [ 696: 696] Allocating stack with size of 8388608 bytes D0712 20:23:44.166980 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.169089 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.169129 30218 usertrap_amd64.go:106] [ 696: 696] Map a usertrap vma at 60000 D0712 20:23:44.169251 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 1 D0712 20:23:44.169270 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:44.169810 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.169832 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 2 D0712 20:23:44.169842 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:44.170395 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.170418 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 3 D0712 20:23:44.170428 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:44.177652 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.177731 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 4 D0712 20:23:44.177747 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:44.179132 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.179198 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 5 D0712 20:23:44.179219 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:44.179326 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.179360 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 6 D0712 20:23:44.179372 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:44.179838 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.179863 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 7 D0712 20:23:44.179875 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:44.180174 30218 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.180196 30218 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc000db34a0 8 D0712 20:23:44.180204 30218 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:44.180481 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.180505 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 9 D0712 20:23:44.180518 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:44.180530 30218 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.180540 30218 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc000db34a0 10 D0712 20:23:44.180547 30218 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:44.188273 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.188298 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 11 D0712 20:23:44.188309 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:44.190993 30218 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.191022 30218 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc000db34a0 12 D0712 20:23:44.191036 30218 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:44.191058 30218 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.191073 30218 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc000db34a0 13 D0712 20:23:44.191084 30218 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:44.191128 30218 task_signals.go:470] [ 696: 696] Notified of signal 23 D0712 20:23:44.191172 30218 task_signals.go:220] [ 696: 696] Signal 23: delivering to handler D0712 20:23:44.197999 30218 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.198026 30218 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000db34a0 14 D0712 20:23:44.198037 30218 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:44.198125 30218 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.198155 30218 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.198179 30218 task_signals.go:204] [ 696: 700] Signal 696, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.198199 30218 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.198208 30218 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.198215 30218 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.198191 30218 task_signals.go:204] [ 696: 699] Signal 696, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.198239 30218 task_signals.go:204] [ 696: 701] Signal 696, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.198252 30218 task_signals.go:204] [ 696: 697] Signal 696, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.198260 30218 task_exit.go:204] [ 696: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.198268 30218 task_signals.go:204] [ 696: 698] Signal 696, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.198288 30218 task_exit.go:204] [ 696: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.198310 30218 task_exit.go:204] [ 696: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.198321 30218 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.198329 30218 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.198332 30218 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.198339 30218 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.198343 30218 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.198346 30218 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.198352 30218 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.199591 30218 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.199623 30218 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.199644 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.199671 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.199689 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.199740 30218 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.200233 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.201759 30218 syscalls.go:262] [ 702: 702] Allocating stack with size of 8388608 bytes D0712 20:23:44.201867 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.202747 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.202784 30218 usertrap_amd64.go:106] [ 702: 702] Map a usertrap vma at 69000 D0712 20:23:44.202913 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 1 D0712 20:23:44.202952 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.203428 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.203452 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 2 D0712 20:23:44.203506 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.204571 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.204675 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 3 D0712 20:23:44.204702 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.211455 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.211567 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 4 D0712 20:23:44.211596 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.212738 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.212763 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 5 D0712 20:23:44.212777 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.212828 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.212860 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 6 D0712 20:23:44.212873 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.213205 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.213237 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 7 D0712 20:23:44.213249 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.213497 30218 usertrap_amd64.go:212] [ 702: 703] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.213895 30218 usertrap_amd64.go:122] [ 702: 703] Allocate a new trap: 0xc0015a3590 8 D0712 20:23:44.213923 30218 usertrap_amd64.go:225] [ 702: 703] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.213973 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.213982 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 9 D0712 20:23:44.213991 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.214095 30218 usertrap_amd64.go:212] [ 702: 703] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.214119 30218 usertrap_amd64.go:122] [ 702: 703] Allocate a new trap: 0xc0015a3590 10 D0712 20:23:44.214126 30218 usertrap_amd64.go:225] [ 702: 703] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.221082 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.221113 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 11 D0712 20:23:44.221129 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.225118 30218 usertrap_amd64.go:212] [ 702: 703] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.225239 30218 usertrap_amd64.go:122] [ 702: 703] Allocate a new trap: 0xc0015a3590 12 D0712 20:23:44.225285 30218 usertrap_amd64.go:225] [ 702: 703] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.225356 30218 usertrap_amd64.go:212] [ 702: 703] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.225366 30218 usertrap_amd64.go:122] [ 702: 703] Allocate a new trap: 0xc0015a3590 13 D0712 20:23:44.225374 30218 usertrap_amd64.go:225] [ 702: 703] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.225433 30218 task_signals.go:470] [ 702: 702] Notified of signal 23 D0712 20:23:44.225664 30218 task_signals.go:220] [ 702: 702] Signal 23: delivering to handler I0712 20:23:44.231635 30218 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0712 20:23:44.231706 30218 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.231716 30218 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0015a3590 14 D0712 20:23:44.231724 30218 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.231756 30218 task_exit.go:204] [ 702: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.231784 30218 task_exit.go:204] [ 702: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.231802 30218 task_signals.go:204] [ 702: 706] Signal 702, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.231799 30218 task_signals.go:204] [ 702: 705] Signal 702, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.231813 30218 task_signals.go:204] [ 702: 704] Signal 702, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.231823 30218 task_exit.go:204] [ 702: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.231843 30218 task_signals.go:204] [ 702: 703] Signal 702, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.231854 30218 task_exit.go:204] [ 702: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.231859 30218 task_exit.go:204] [ 702: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.231870 30218 task_exit.go:204] [ 702: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.231876 30218 task_exit.go:204] [ 702: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.231891 30218 task_exit.go:204] [ 702: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.231900 30218 task_exit.go:204] [ 702: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.231908 30218 task_exit.go:204] [ 702: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.231914 30218 task_exit.go:204] [ 702: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.231931 30218 task_exit.go:204] [ 702: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.233036 30218 task_exit.go:204] [ 702: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.233064 30218 task_exit.go:204] [ 702: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.233077 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.233685 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.233707 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.233988 30218 task_exit.go:204] [ 702: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.234107 30218 task_signals.go:470] [ 7: 10] Notified of signal 23 D0712 20:23:44.234278 30218 task_signals.go:220] [ 7: 10] Signal 23: delivering to handler D0712 20:23:44.234927 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.236484 30218 syscalls.go:262] [ 707: 707] Allocating stack with size of 8388608 bytes D0712 20:23:44.236627 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.241916 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.241975 30218 usertrap_amd64.go:106] [ 707: 707] Map a usertrap vma at 69000 D0712 20:23:44.242063 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 1 D0712 20:23:44.242098 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.242397 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.242600 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 2 D0712 20:23:44.242635 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.243872 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.243902 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 3 D0712 20:23:44.243918 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.259060 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.259104 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 4 D0712 20:23:44.259123 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.260249 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.260279 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 5 D0712 20:23:44.260293 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.260331 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.260338 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 6 D0712 20:23:44.260345 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.260535 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.260553 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 7 D0712 20:23:44.260560 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.260695 30218 usertrap_amd64.go:212] [ 707: 708] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.260737 30218 usertrap_amd64.go:122] [ 707: 708] Allocate a new trap: 0xc000db3e30 8 D0712 20:23:44.260752 30218 usertrap_amd64.go:225] [ 707: 708] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.260987 30218 usertrap_amd64.go:212] [ 707: 708] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.261053 30218 usertrap_amd64.go:122] [ 707: 708] Allocate a new trap: 0xc000db3e30 9 D0712 20:23:44.261110 30218 usertrap_amd64.go:225] [ 707: 708] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.261144 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.261154 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 10 D0712 20:23:44.261161 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.269144 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.269178 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 11 D0712 20:23:44.269191 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.271844 30218 usertrap_amd64.go:212] [ 707: 708] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.271878 30218 usertrap_amd64.go:122] [ 707: 708] Allocate a new trap: 0xc000db3e30 12 D0712 20:23:44.271890 30218 usertrap_amd64.go:225] [ 707: 708] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.271927 30218 usertrap_amd64.go:212] [ 707: 708] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.271934 30218 usertrap_amd64.go:122] [ 707: 708] Allocate a new trap: 0xc000db3e30 13 D0712 20:23:44.271950 30218 usertrap_amd64.go:225] [ 707: 708] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.271963 30218 task_signals.go:470] [ 707: 707] Notified of signal 23 D0712 20:23:44.272116 30218 task_signals.go:220] [ 707: 707] Signal 23: delivering to handler D0712 20:23:44.280038 30218 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.280087 30218 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc000db3e30 14 D0712 20:23:44.280107 30218 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.280177 30218 task_exit.go:204] [ 707: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.280285 30218 task_exit.go:204] [ 707: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.280356 30218 task_signals.go:204] [ 707: 709] Signal 707, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.280374 30218 task_exit.go:204] [ 707: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.280384 30218 task_exit.go:204] [ 707: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.280390 30218 task_exit.go:204] [ 707: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.280438 30218 task_signals.go:204] [ 707: 708] Signal 707, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.280501 30218 task_exit.go:204] [ 707: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.280527 30218 task_exit.go:204] [ 707: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.280544 30218 task_exit.go:204] [ 707: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.280568 30218 task_signals.go:204] [ 707: 710] Signal 707, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.280594 30218 task_exit.go:204] [ 707: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.280607 30218 task_exit.go:204] [ 707: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.280612 30218 task_exit.go:204] [ 707: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.280626 30218 task_signals.go:204] [ 707: 711] Signal 707, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.280636 30218 task_exit.go:204] [ 707: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.281951 30218 task_exit.go:204] [ 707: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.285018 30218 task_exit.go:204] [ 707: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.285073 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.285142 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.285163 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.285296 30218 task_exit.go:204] [ 707: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.285858 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.286946 30218 syscalls.go:262] [ 712: 712] Allocating stack with size of 8388608 bytes D0712 20:23:44.287051 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.288286 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.288325 30218 usertrap_amd64.go:106] [ 712: 712] Map a usertrap vma at 68000 D0712 20:23:44.288415 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 1 D0712 20:23:44.288471 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:44.288830 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.288896 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 2 D0712 20:23:44.288918 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:44.289711 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.289734 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 3 D0712 20:23:44.289743 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:44.296785 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.296820 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 4 D0712 20:23:44.296835 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:44.298217 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.298248 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 5 D0712 20:23:44.298262 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:44.298303 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.298313 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 6 D0712 20:23:44.298320 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:44.298527 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.298548 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 7 D0712 20:23:44.298556 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:44.298718 30218 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.298748 30218 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc0015a3d70 8 D0712 20:23:44.298759 30218 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:44.299123 30218 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.299137 30218 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc0015a3d70 9 D0712 20:23:44.299181 30218 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:44.299469 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.299541 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 10 D0712 20:23:44.299589 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:44.307217 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.307236 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 11 D0712 20:23:44.307249 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:44.311539 30218 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.311564 30218 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc0015a3d70 12 D0712 20:23:44.311593 30218 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:44.311634 30218 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.311653 30218 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc0015a3d70 13 D0712 20:23:44.311666 30218 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:44.311821 30218 task_signals.go:470] [ 712: 712] Notified of signal 23 D0712 20:23:44.311881 30218 task_signals.go:220] [ 712: 712] Signal 23: delivering to handler D0712 20:23:44.317457 30218 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.317502 30218 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc0015a3d70 14 D0712 20:23:44.317517 30218 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:44.317592 30218 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.317635 30218 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.317664 30218 task_signals.go:204] [ 712: 716] Signal 712, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.317682 30218 task_signals.go:204] [ 712: 714] Signal 712, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.317703 30218 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.317697 30218 task_signals.go:204] [ 712: 713] Signal 712, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.317713 30218 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.317736 30218 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.317794 30218 task_signals.go:204] [ 712: 715] Signal 712, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.317812 30218 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.317832 30218 task_signals.go:204] [ 712: 717] Signal 712, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.317844 30218 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.317849 30218 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.317870 30218 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.317890 30218 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.317897 30218 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.317907 30218 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.317915 30218 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.317933 30218 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.317959 30218 task_exit.go:204] [ 712: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.319258 30218 task_exit.go:204] [ 712: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.319287 30218 task_exit.go:204] [ 712: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.319301 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.319369 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.319379 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.319468 30218 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.319991 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.321337 30218 syscalls.go:262] [ 718: 718] Allocating stack with size of 8388608 bytes D0712 20:23:44.321552 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.322696 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.322736 30218 usertrap_amd64.go:106] [ 718: 718] Map a usertrap vma at 64000 D0712 20:23:44.322801 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 1 D0712 20:23:44.322830 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:44.323079 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.323116 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 2 D0712 20:23:44.323127 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:44.326651 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.326684 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 3 D0712 20:23:44.326695 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:44.333220 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.333252 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 4 D0712 20:23:44.333269 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:44.334943 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.334974 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 5 D0712 20:23:44.334984 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:44.335026 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.335032 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 6 D0712 20:23:44.335037 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:44.335389 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.335440 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 7 D0712 20:23:44.335455 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:44.335630 30218 usertrap_amd64.go:212] [ 718: 719] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.335657 30218 usertrap_amd64.go:122] [ 718: 719] Allocate a new trap: 0xc001a29b60 8 D0712 20:23:44.335669 30218 usertrap_amd64.go:225] [ 718: 719] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:44.335960 30218 usertrap_amd64.go:212] [ 718: 719] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.335978 30218 usertrap_amd64.go:122] [ 718: 719] Allocate a new trap: 0xc001a29b60 9 D0712 20:23:44.335990 30218 usertrap_amd64.go:225] [ 718: 719] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:44.336002 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.336008 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 10 D0712 20:23:44.336084 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:44.344581 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.344617 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 11 D0712 20:23:44.344633 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:44.347480 30218 usertrap_amd64.go:212] [ 718: 719] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.347501 30218 usertrap_amd64.go:122] [ 718: 719] Allocate a new trap: 0xc001a29b60 12 D0712 20:23:44.347513 30218 usertrap_amd64.go:225] [ 718: 719] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:44.347568 30218 usertrap_amd64.go:212] [ 718: 719] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.347585 30218 usertrap_amd64.go:122] [ 718: 719] Allocate a new trap: 0xc001a29b60 13 D0712 20:23:44.347594 30218 usertrap_amd64.go:225] [ 718: 719] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:44.347625 30218 task_signals.go:470] [ 718: 718] Notified of signal 23 D0712 20:23:44.347717 30218 task_signals.go:220] [ 718: 718] Signal 23: delivering to handler D0712 20:23:44.356820 30218 usertrap_amd64.go:212] [ 718: 718] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.356860 30218 usertrap_amd64.go:122] [ 718: 718] Allocate a new trap: 0xc001a29b60 14 D0712 20:23:44.356876 30218 usertrap_amd64.go:225] [ 718: 718] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:44.356973 30218 task_exit.go:204] [ 718: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.357000 30218 task_exit.go:204] [ 718: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.357018 30218 task_signals.go:204] [ 718: 721] Signal 718, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.357021 30218 task_signals.go:204] [ 718: 719] Signal 718, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.357044 30218 task_signals.go:204] [ 718: 723] Signal 718, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.357029 30218 task_signals.go:204] [ 718: 722] Signal 718, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.357051 30218 task_exit.go:204] [ 718: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.357068 30218 task_signals.go:204] [ 718: 720] Signal 718, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.357086 30218 task_exit.go:204] [ 718: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.357093 30218 task_exit.go:204] [ 718: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.357113 30218 task_exit.go:204] [ 718: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.357125 30218 task_exit.go:204] [ 718: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.357131 30218 task_exit.go:204] [ 718: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.357143 30218 task_exit.go:204] [ 718: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.357154 30218 task_exit.go:204] [ 718: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.357160 30218 task_exit.go:204] [ 718: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.357171 30218 task_exit.go:204] [ 718: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.357179 30218 task_exit.go:204] [ 718: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.357184 30218 task_exit.go:204] [ 718: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.357217 30218 task_exit.go:204] [ 718: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.358496 30218 task_exit.go:204] [ 718: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.358545 30218 task_exit.go:204] [ 718: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.358561 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.358588 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.358597 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.358658 30218 task_exit.go:204] [ 718: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.359065 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.360355 30218 syscalls.go:262] [ 724: 724] Allocating stack with size of 8388608 bytes D0712 20:23:44.360504 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.362173 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.362217 30218 usertrap_amd64.go:106] [ 724: 724] Map a usertrap vma at 62000 D0712 20:23:44.362283 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 1 D0712 20:23:44.362317 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:44.362510 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.362531 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 2 D0712 20:23:44.362540 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:44.363480 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.363509 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 3 D0712 20:23:44.363517 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:44.370046 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.370065 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 4 D0712 20:23:44.370077 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:44.371420 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.371477 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 5 D0712 20:23:44.371489 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:44.371808 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.371845 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 6 D0712 20:23:44.371858 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:44.372325 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.372355 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 7 D0712 20:23:44.372366 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:44.372570 30218 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.372592 30218 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc000e0ab70 8 D0712 20:23:44.372602 30218 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:44.372785 30218 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.372816 30218 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc000e0ab70 9 D0712 20:23:44.372828 30218 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:44.373027 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.373051 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 10 D0712 20:23:44.373061 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:44.373628 30218 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.373668 30218 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc000e0ab70 11 D0712 20:23:44.373678 30218 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:44.373720 30218 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.373728 30218 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc000e0ab70 12 D0712 20:23:44.373735 30218 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:44.373776 30218 task_signals.go:470] [ 724: 724] Notified of signal 23 D0712 20:23:44.373862 30218 task_signals.go:220] [ 724: 724] Signal 23: delivering to handler D0712 20:23:44.381449 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.381476 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 13 D0712 20:23:44.381488 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:44.384299 30218 task_signals.go:470] [ 724: 724] Notified of signal 23 D0712 20:23:44.384411 30218 task_signals.go:220] [ 724: 724] Signal 23: delivering to handler D0712 20:23:44.392679 30218 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.392720 30218 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc000e0ab70 14 D0712 20:23:44.392740 30218 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:44.392814 30218 task_exit.go:204] [ 724: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.392842 30218 task_exit.go:204] [ 724: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.392875 30218 task_signals.go:204] [ 724: 725] Signal 724, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.392916 30218 task_exit.go:204] [ 724: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.392936 30218 task_exit.go:204] [ 724: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.392970 30218 task_exit.go:204] [ 724: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.392998 30218 task_signals.go:204] [ 724: 726] Signal 724, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.393023 30218 task_exit.go:204] [ 724: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.393032 30218 task_exit.go:204] [ 724: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.393037 30218 task_exit.go:204] [ 724: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.393052 30218 task_signals.go:204] [ 724: 727] Signal 724, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.393062 30218 task_exit.go:204] [ 724: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.393069 30218 task_exit.go:204] [ 724: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.393085 30218 task_exit.go:204] [ 724: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.393100 30218 task_signals.go:204] [ 724: 728] Signal 724, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.393110 30218 task_exit.go:204] [ 724: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.394460 30218 task_exit.go:204] [ 724: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.394501 30218 task_exit.go:204] [ 724: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.394516 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.394561 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.394586 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.394632 30218 task_exit.go:204] [ 724: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.395197 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.396390 30218 syscalls.go:262] [ 729: 729] Allocating stack with size of 8388608 bytes D0712 20:23:44.396501 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.397949 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.397986 30218 usertrap_amd64.go:106] [ 729: 729] Map a usertrap vma at 69000 D0712 20:23:44.398074 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 1 D0712 20:23:44.398117 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.398623 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.398782 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 2 D0712 20:23:44.398817 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.399416 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.399441 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 3 D0712 20:23:44.399450 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.405361 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.405399 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 4 D0712 20:23:44.405413 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.406525 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.406553 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 5 D0712 20:23:44.406566 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.406609 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.406616 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 6 D0712 20:23:44.406625 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.406981 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.407021 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 7 D0712 20:23:44.407036 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.407260 30218 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.407271 30218 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc001a81b00 8 D0712 20:23:44.407278 30218 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.407444 30218 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.407483 30218 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc001a81b00 9 D0712 20:23:44.407495 30218 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.407526 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.407541 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 10 D0712 20:23:44.407552 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.407838 30218 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.407902 30218 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc001a81b00 11 D0712 20:23:44.407916 30218 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.407967 30218 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.407991 30218 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc001a81b00 12 D0712 20:23:44.408001 30218 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.408026 30218 task_signals.go:470] [ 729: 732] Notified of signal 23 D0712 20:23:44.408061 30218 task_signals.go:179] [ 729: 732] Restarting syscall 202: interrupted by signal 23 D0712 20:23:44.408071 30218 task_signals.go:220] [ 729: 732] Signal 23: delivering to handler D0712 20:23:44.408194 30218 task_signals.go:470] [ 729: 729] Notified of signal 23 D0712 20:23:44.408228 30218 task_signals.go:220] [ 729: 729] Signal 23: delivering to handler D0712 20:23:44.414598 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.414627 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 13 D0712 20:23:44.414639 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.418451 30218 task_signals.go:470] [ 729: 729] Notified of signal 23 D0712 20:23:44.418502 30218 task_signals.go:220] [ 729: 729] Signal 23: delivering to handler D0712 20:23:44.424186 30218 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.424221 30218 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001a81b00 14 D0712 20:23:44.424234 30218 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.424296 30218 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.424313 30218 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.424363 30218 task_signals.go:204] [ 729: 731] Signal 729, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.424432 30218 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.424453 30218 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.424485 30218 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.424510 30218 task_signals.go:204] [ 729: 732] Signal 729, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.424522 30218 task_signals.go:204] [ 729: 733] Signal 729, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.424534 30218 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.424586 30218 task_signals.go:204] [ 729: 730] Signal 729, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.424607 30218 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.424614 30218 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.424636 30218 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.424663 30218 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.424678 30218 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.424690 30218 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.426043 30218 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.426064 30218 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.426075 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.426130 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.426156 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.426214 30218 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.426264 30218 task_signals.go:470] [ 7: 14] Notified of signal 23 D0712 20:23:44.426280 30218 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0712 20:23:44.426765 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.428085 30218 syscalls.go:262] [ 734: 734] Allocating stack with size of 8388608 bytes D0712 20:23:44.428202 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.429467 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.429511 30218 usertrap_amd64.go:106] [ 734: 734] Map a usertrap vma at 63000 D0712 20:23:44.429620 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 1 D0712 20:23:44.429652 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:44.430032 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.430053 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 2 D0712 20:23:44.430062 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:44.430767 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.430800 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 3 D0712 20:23:44.430812 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:44.437250 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.437279 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 4 D0712 20:23:44.437291 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:44.438440 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.438467 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 5 D0712 20:23:44.438480 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:44.438522 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.438530 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 6 D0712 20:23:44.438537 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:44.438720 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.438740 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 7 D0712 20:23:44.438748 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:44.438924 30218 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.438946 30218 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000eccb70 8 D0712 20:23:44.438958 30218 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:44.439099 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.439132 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 9 D0712 20:23:44.439143 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:44.439166 30218 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.439173 30218 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000eccb70 10 D0712 20:23:44.439180 30218 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:44.439688 30218 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.439720 30218 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000eccb70 11 D0712 20:23:44.439732 30218 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:44.439749 30218 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.439755 30218 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc000eccb70 12 D0712 20:23:44.439763 30218 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:44.439834 30218 task_signals.go:470] [ 734: 734] Notified of signal 23 D0712 20:23:44.439927 30218 task_signals.go:220] [ 734: 734] Signal 23: delivering to handler D0712 20:23:44.446971 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.447010 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 13 D0712 20:23:44.447024 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:44.451252 30218 task_signals.go:470] [ 734: 734] Notified of signal 23 D0712 20:23:44.451311 30218 task_signals.go:220] [ 734: 734] Signal 23: delivering to handler I0712 20:23:44.457762 30218 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0712 20:23:44.457849 30218 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.457866 30218 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc000eccb70 14 D0712 20:23:44.457879 30218 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:44.457935 30218 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.457964 30218 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.457964 30218 task_signals.go:204] [ 734: 736] Signal 734, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.457984 30218 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.457982 30218 task_signals.go:204] [ 734: 737] Signal 734, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.458001 30218 task_signals.go:204] [ 734: 735] Signal 734, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.458010 30218 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.458014 30218 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.458025 30218 task_signals.go:204] [ 734: 738] Signal 734, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.458045 30218 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.458050 30218 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.458054 30218 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.458060 30218 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.458067 30218 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.458071 30218 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.458078 30218 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.459310 30218 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.459330 30218 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.459339 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.459405 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.459439 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.459498 30218 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.460136 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.461603 30218 syscalls.go:262] [ 739: 739] Allocating stack with size of 8388608 bytes D0712 20:23:44.461761 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.462689 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.462729 30218 usertrap_amd64.go:106] [ 739: 739] Map a usertrap vma at 6a000 D0712 20:23:44.462807 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 1 D0712 20:23:44.462842 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:44.463070 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.463081 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 2 D0712 20:23:44.463087 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:44.463575 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.463596 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 3 D0712 20:23:44.463604 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:44.469792 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.469833 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 4 D0712 20:23:44.469846 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:44.470973 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.471000 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 5 D0712 20:23:44.471013 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:44.471051 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.471056 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 6 D0712 20:23:44.471061 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:44.471211 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.471224 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 7 D0712 20:23:44.471229 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:44.471337 30218 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.471354 30218 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc001a81dd0 8 D0712 20:23:44.471363 30218 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:44.471417 30218 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.471428 30218 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc001a81dd0 9 D0712 20:23:44.471433 30218 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:44.471497 30218 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.471535 30218 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc001a81dd0 10 D0712 20:23:44.471557 30218 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b020 trap addr 6a320 ([184 39 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:44.471581 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.471600 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 11 D0712 20:23:44.471609 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b57c trap addr 6a370 ([184 202 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:44.471671 30218 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.471689 30218 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc001a81dd0 12 D0712 20:23:44.471699 30218 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:44.471826 30218 task_signals.go:470] [ 739: 739] Notified of signal 23 D0712 20:23:44.471856 30218 task_signals.go:179] [ 739: 739] Restarting syscall 202: interrupted by signal 23 D0712 20:23:44.471863 30218 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler D0712 20:23:44.478288 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.478325 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 13 D0712 20:23:44.478341 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:44.482094 30218 task_signals.go:470] [ 739: 739] Notified of signal 23 D0712 20:23:44.482147 30218 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler D0712 20:23:44.487726 30218 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.487772 30218 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc001a81dd0 14 D0712 20:23:44.487788 30218 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:44.487850 30218 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.487880 30218 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.487902 30218 task_signals.go:204] [ 739: 743] Signal 739, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.487920 30218 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.487916 30218 task_signals.go:204] [ 739: 741] Signal 739, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.487959 30218 task_signals.go:204] [ 739: 740] Signal 739, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.487895 30218 task_signals.go:204] [ 739: 742] Signal 739, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.487972 30218 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.487995 30218 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.488009 30218 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.488017 30218 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.488023 30218 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.488032 30218 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.488040 30218 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.488045 30218 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.488053 30218 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.489180 30218 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.489204 30218 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.489221 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.489260 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.489297 30218 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.489284 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.489865 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.490946 30218 syscalls.go:262] [ 744: 744] Allocating stack with size of 8388608 bytes D0712 20:23:44.491029 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.492215 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.492253 30218 usertrap_amd64.go:106] [ 744: 744] Map a usertrap vma at 67000 D0712 20:23:44.492329 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 1 D0712 20:23:44.492359 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:44.492621 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.492642 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 2 D0712 20:23:44.492654 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:44.493639 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.493662 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 3 D0712 20:23:44.493670 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:44.498883 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.498913 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 4 D0712 20:23:44.498921 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:44.500040 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.500057 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 5 D0712 20:23:44.500071 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:44.500128 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.500147 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 6 D0712 20:23:44.500156 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:44.500407 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.500428 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 7 D0712 20:23:44.500437 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:44.500645 30218 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.500669 30218 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0005be030 8 D0712 20:23:44.500677 30218 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:44.500846 30218 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.500871 30218 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0005be030 9 D0712 20:23:44.500882 30218 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:44.500895 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.500901 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 10 D0712 20:23:44.500908 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:44.507816 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.507844 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 11 D0712 20:23:44.507858 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:44.511987 30218 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.512023 30218 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0005be030 12 D0712 20:23:44.512039 30218 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:44.512175 30218 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.512204 30218 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0005be030 13 D0712 20:23:44.512213 30218 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:44.512339 30218 task_signals.go:470] [ 744: 744] Notified of signal 23 D0712 20:23:44.512629 30218 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler I0712 20:23:44.517673 30218 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0712 20:23:44.517739 30218 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.517755 30218 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0005be030 14 D0712 20:23:44.517769 30218 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:44.517812 30218 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.517851 30218 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.517851 30218 task_signals.go:204] [ 744: 748] Signal 744, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.517878 30218 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.517903 30218 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.517911 30218 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.517935 30218 task_signals.go:204] [ 744: 749] Signal 744, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.517959 30218 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.517976 30218 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.517983 30218 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.517994 30218 task_signals.go:204] [ 744: 745] Signal 744, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.518012 30218 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.518021 30218 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.518026 30218 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.518037 30218 task_signals.go:204] [ 744: 747] Signal 744, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.518046 30218 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.518052 30218 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.518058 30218 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.518077 30218 task_signals.go:204] [ 744: 746] Signal 744, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.518095 30218 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.519151 30218 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.519165 30218 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.519175 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.519202 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.519209 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.519360 30218 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.519754 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.521043 30218 syscalls.go:262] [ 750: 750] Allocating stack with size of 8388608 bytes D0712 20:23:44.521184 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.524152 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.524187 30218 usertrap_amd64.go:106] [ 750: 750] Map a usertrap vma at 61000 D0712 20:23:44.524298 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 1 D0712 20:23:44.524329 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:44.524574 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.524593 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 2 D0712 20:23:44.524601 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:44.525304 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.525326 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 3 D0712 20:23:44.525336 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:44.531548 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.531592 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 4 D0712 20:23:44.531606 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:44.532696 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.532723 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 5 D0712 20:23:44.532736 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:44.532784 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.532793 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 6 D0712 20:23:44.532800 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:44.533056 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.533092 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 7 D0712 20:23:44.533102 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:44.533227 30218 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.533277 30218 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000ac2660 8 D0712 20:23:44.533283 30218 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:44.533473 30218 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.533502 30218 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000ac2660 9 D0712 20:23:44.533515 30218 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:44.533524 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.533528 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 10 D0712 20:23:44.533580 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:44.533969 30218 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.533997 30218 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000ac2660 11 D0712 20:23:44.534010 30218 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:44.534106 30218 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.534125 30218 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000ac2660 12 D0712 20:23:44.534136 30218 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:44.534174 30218 task_signals.go:470] [ 750: 750] Notified of signal 23 D0712 20:23:44.534236 30218 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler D0712 20:23:44.540122 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.540146 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 13 D0712 20:23:44.540160 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:44.544443 30218 task_signals.go:470] [ 750: 750] Notified of signal 23 D0712 20:23:44.544541 30218 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler D0712 20:23:44.549674 30218 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.549710 30218 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000ac2660 14 D0712 20:23:44.549726 30218 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:44.549780 30218 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.549806 30218 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.549829 30218 task_signals.go:204] [ 750: 751] Signal 750, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.549852 30218 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.549860 30218 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.549865 30218 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.549880 30218 task_signals.go:204] [ 750: 752] Signal 750, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.549893 30218 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.549898 30218 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.549901 30218 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.549911 30218 task_signals.go:204] [ 750: 753] Signal 750, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.549924 30218 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.549937 30218 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.549951 30218 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.549970 30218 task_signals.go:204] [ 750: 754] Signal 750, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.549986 30218 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.551110 30218 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.551133 30218 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.551150 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.551175 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.551180 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.551293 30218 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.551583 30218 task_signals.go:470] [ 7: 14] Notified of signal 23 D0712 20:23:44.551623 30218 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0712 20:23:44.551932 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.553115 30218 syscalls.go:262] [ 755: 755] Allocating stack with size of 8388608 bytes D0712 20:23:44.553228 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.554296 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.554332 30218 usertrap_amd64.go:106] [ 755: 755] Map a usertrap vma at 67000 D0712 20:23:44.554440 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 1 D0712 20:23:44.554471 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:44.554790 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.554814 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 2 D0712 20:23:44.554824 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:44.555183 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.555207 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 3 D0712 20:23:44.555218 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:44.560321 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.560352 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 4 D0712 20:23:44.560366 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:44.561393 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.561420 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 5 D0712 20:23:44.561430 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:44.561477 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.561496 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 6 D0712 20:23:44.561506 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:44.561816 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.561834 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 7 D0712 20:23:44.561845 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:44.562024 30218 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.562052 30218 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc000eccf60 8 D0712 20:23:44.562063 30218 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:44.562190 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.562212 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 9 D0712 20:23:44.562222 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:44.562257 30218 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.562277 30218 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc000eccf60 10 D0712 20:23:44.562375 30218 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:44.568867 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.568895 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 11 D0712 20:23:44.568904 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:44.572593 30218 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.572625 30218 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc000eccf60 12 D0712 20:23:44.572639 30218 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:44.572674 30218 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.572690 30218 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc000eccf60 13 D0712 20:23:44.572699 30218 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:44.572747 30218 task_signals.go:470] [ 755: 755] Notified of signal 23 D0712 20:23:44.572825 30218 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler I0712 20:23:44.579047 30218 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0712 20:23:44.579114 30218 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.579125 30218 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000eccf60 14 D0712 20:23:44.579137 30218 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:44.579173 30218 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.579209 30218 task_signals.go:204] [ 755: 757] Signal 755, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.579235 30218 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.579256 30218 task_signals.go:204] [ 755: 758] Signal 755, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.579279 30218 task_signals.go:204] [ 755: 756] Signal 755, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.579290 30218 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.579305 30218 task_signals.go:204] [ 755: 759] Signal 755, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.579325 30218 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.579330 30218 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.579342 30218 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.579355 30218 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.579361 30218 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.579374 30218 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.579383 30218 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.579388 30218 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.579397 30218 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.580627 30218 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.580654 30218 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.580678 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.580747 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.580794 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.580883 30218 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.581378 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.582567 30218 syscalls.go:262] [ 760: 760] Allocating stack with size of 8388608 bytes D0712 20:23:44.582685 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.583880 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.583918 30218 usertrap_amd64.go:106] [ 760: 760] Map a usertrap vma at 65000 D0712 20:23:44.583980 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 1 D0712 20:23:44.584015 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:44.584228 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.584253 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 2 D0712 20:23:44.584264 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:44.584789 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.584812 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 3 D0712 20:23:44.584824 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:44.591176 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.591213 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 4 D0712 20:23:44.591224 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:44.592351 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.592375 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 5 D0712 20:23:44.592384 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:44.592463 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.592476 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 6 D0712 20:23:44.592490 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:44.592745 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.592773 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 7 D0712 20:23:44.592786 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:44.593013 30218 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.593037 30218 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000ff1260 8 D0712 20:23:44.593068 30218 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:44.593243 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.593265 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 9 D0712 20:23:44.593275 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:44.593286 30218 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.593292 30218 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000ff1260 10 D0712 20:23:44.593391 30218 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:44.593718 30218 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.593745 30218 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000ff1260 11 D0712 20:23:44.593756 30218 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:44.593842 30218 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.593914 30218 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000ff1260 12 D0712 20:23:44.594014 30218 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:44.594048 30218 task_signals.go:470] [ 760: 760] Notified of signal 23 D0712 20:23:44.594182 30218 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0712 20:23:44.600531 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.600556 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 13 D0712 20:23:44.600564 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:44.605291 30218 task_signals.go:470] [ 760: 760] Notified of signal 23 D0712 20:23:44.605421 30218 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler I0712 20:23:44.610827 30218 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0712 20:23:44.610915 30218 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.610958 30218 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000ff1260 14 D0712 20:23:44.610979 30218 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:44.611047 30218 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.611070 30218 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.611099 30218 task_signals.go:204] [ 760: 761] Signal 760, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.611121 30218 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.611130 30218 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.611136 30218 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.611155 30218 task_signals.go:204] [ 760: 762] Signal 760, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.611173 30218 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.611181 30218 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.611186 30218 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.611198 30218 task_signals.go:204] [ 760: 763] Signal 760, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.611218 30218 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.611226 30218 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.611235 30218 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.611252 30218 task_signals.go:204] [ 760: 764] Signal 760, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.611262 30218 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.612513 30218 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.612536 30218 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.612547 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.612637 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.612662 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.612754 30218 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.613573 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.614995 30218 syscalls.go:262] [ 765: 765] Allocating stack with size of 8388608 bytes D0712 20:23:44.615080 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.616275 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.616309 30218 usertrap_amd64.go:106] [ 765: 765] Map a usertrap vma at 68000 D0712 20:23:44.616371 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 1 D0712 20:23:44.616405 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:44.616680 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.616702 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 2 D0712 20:23:44.616713 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:44.617264 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.617326 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 3 D0712 20:23:44.617350 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:44.624744 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.624778 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 4 D0712 20:23:44.624790 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:44.625960 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.625987 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 5 D0712 20:23:44.626001 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:44.626070 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.626116 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 6 D0712 20:23:44.626164 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:44.626390 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.626410 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 7 D0712 20:23:44.626417 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:44.626550 30218 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.626575 30218 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc0005be990 8 D0712 20:23:44.626585 30218 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:44.626742 30218 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.626815 30218 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc0005be990 9 D0712 20:23:44.626847 30218 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:44.627050 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:44.627273 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 10 D0712 20:23:44.627341 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b6e0 trap addr 68320 ([184 24 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:44.627406 30218 usertrap_amd64.go:212] [ 765: 767] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.627480 30218 usertrap_amd64.go:122] [ 765: 767] Allocate a new trap: 0xc0005be990 11 D0712 20:23:44.627564 30218 usertrap_amd64.go:225] [ 765: 767] Apply the binary patch addr 46b57c trap addr 68370 ([184 202 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:44.636532 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.636586 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 12 D0712 20:23:44.636605 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:44.639250 30218 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.639291 30218 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc0005be990 13 D0712 20:23:44.639307 30218 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:44.639337 30218 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.639344 30218 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc0005be990 14 D0712 20:23:44.639353 30218 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:44.639390 30218 task_signals.go:470] [ 765: 765] Notified of signal 23 D0712 20:23:44.639451 30218 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler D0712 20:23:44.647976 30218 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.648034 30218 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc0005be990 15 D0712 20:23:44.648055 30218 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 20:23:44.648116 30218 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.648139 30218 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.648176 30218 task_signals.go:204] [ 765: 768] Signal 765, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.648199 30218 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.648210 30218 task_signals.go:204] [ 765: 769] Signal 765, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.648219 30218 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.648226 30218 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.648207 30218 task_signals.go:204] [ 765: 767] Signal 765, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.648246 30218 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.648311 30218 task_signals.go:204] [ 765: 766] Signal 765, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.648342 30218 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.648358 30218 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.648381 30218 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.648391 30218 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.648397 30218 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.648697 30218 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.650663 30218 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.650716 30218 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.650746 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.650791 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.650815 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.650934 30218 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.651695 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.653472 30218 syscalls.go:262] [ 770: 770] Allocating stack with size of 8388608 bytes D0712 20:23:44.653655 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.657367 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.657413 30218 usertrap_amd64.go:106] [ 770: 770] Map a usertrap vma at 69000 D0712 20:23:44.657525 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 1 D0712 20:23:44.657564 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:44.658022 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.658073 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 2 D0712 20:23:44.658092 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:44.658874 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.658901 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 3 D0712 20:23:44.658916 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:44.665544 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.665582 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 4 D0712 20:23:44.665596 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:44.666886 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.666916 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 5 D0712 20:23:44.666929 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:44.666991 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.667006 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 6 D0712 20:23:44.667012 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:44.667453 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.667471 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 7 D0712 20:23:44.667477 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:44.667645 30218 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.667703 30218 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000ff1830 8 D0712 20:23:44.667725 30218 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:44.668085 30218 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.668108 30218 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000ff1830 9 D0712 20:23:44.668116 30218 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:44.668123 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.668128 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 10 D0712 20:23:44.668136 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:44.668307 30218 usertrap_amd64.go:212] [ 770: 773] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:44.668353 30218 usertrap_amd64.go:122] [ 770: 773] Allocate a new trap: 0xc000ff1830 11 D0712 20:23:44.668373 30218 usertrap_amd64.go:225] [ 770: 773] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:44.676926 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.677001 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 12 D0712 20:23:44.677016 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:44.679580 30218 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.679620 30218 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000ff1830 13 D0712 20:23:44.679634 30218 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:44.679730 30218 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.679755 30218 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000ff1830 14 D0712 20:23:44.679765 30218 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:44.679812 30218 task_signals.go:470] [ 770: 770] Notified of signal 23 D0712 20:23:44.679897 30218 task_signals.go:220] [ 770: 770] Signal 23: delivering to handler D0712 20:23:44.687586 30218 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.687644 30218 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000ff1830 15 D0712 20:23:44.687663 30218 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0712 20:23:44.687725 30218 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.687767 30218 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.687771 30218 task_signals.go:204] [ 770: 771] Signal 770, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.687803 30218 task_signals.go:204] [ 770: 773] Signal 770, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.687819 30218 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.687846 30218 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.687854 30218 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.687878 30218 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.687899 30218 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.687906 30218 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.687926 30218 task_signals.go:204] [ 770: 774] Signal 770, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.687949 30218 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.687961 30218 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.687967 30218 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.687993 30218 task_signals.go:204] [ 770: 772] Signal 770, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.688013 30218 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.689539 30218 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.689576 30218 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.689590 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.689622 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.689642 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.689702 30218 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.690354 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.691945 30218 syscalls.go:262] [ 775: 775] Allocating stack with size of 8388608 bytes D0712 20:23:44.692071 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.695703 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.695760 30218 usertrap_amd64.go:106] [ 775: 775] Map a usertrap vma at 61000 D0712 20:23:44.695862 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 1 D0712 20:23:44.695891 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:44.696355 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.696393 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 2 D0712 20:23:44.696410 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:44.697073 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.697100 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 3 D0712 20:23:44.697114 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:44.700322 30218 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0712 20:23:44.703307 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.703348 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 4 D0712 20:23:44.703365 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:44.704438 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.704463 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 5 D0712 20:23:44.704478 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:44.704533 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.704552 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 6 D0712 20:23:44.704564 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:44.704924 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.705009 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 7 D0712 20:23:44.705022 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:44.705241 30218 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.705267 30218 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0005beed0 8 D0712 20:23:44.705276 30218 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:44.705504 30218 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.705520 30218 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0005beed0 9 D0712 20:23:44.705531 30218 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:44.705727 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:44.705753 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 10 D0712 20:23:44.705769 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:44.705846 30218 usertrap_amd64.go:212] [ 775: 777] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.705872 30218 usertrap_amd64.go:122] [ 775: 777] Allocate a new trap: 0xc0005beed0 11 D0712 20:23:44.705887 30218 usertrap_amd64.go:225] [ 775: 777] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:44.706342 30218 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.706373 30218 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0005beed0 12 D0712 20:23:44.706387 30218 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:44.706501 30218 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.706521 30218 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0005beed0 13 D0712 20:23:44.706530 30218 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:44.706564 30218 task_signals.go:470] [ 775: 775] Notified of signal 23 D0712 20:23:44.706615 30218 task_signals.go:220] [ 775: 775] Signal 23: delivering to handler D0712 20:23:44.713589 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.713621 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 14 D0712 20:23:44.713632 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46af29 trap addr 61460 ([184 37 1 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:44.717254 30218 task_signals.go:470] [ 775: 775] Notified of signal 23 D0712 20:23:44.717322 30218 task_signals.go:220] [ 775: 775] Signal 23: delivering to handler D0712 20:23:44.724279 30218 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.724332 30218 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005beed0 15 D0712 20:23:44.724351 30218 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 20:23:44.724443 30218 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.724480 30218 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.724513 30218 task_signals.go:204] [ 775: 779] Signal 775, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.724533 30218 task_signals.go:204] [ 775: 777] Signal 775, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.724545 30218 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.724575 30218 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.724588 30218 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.724484 30218 task_signals.go:204] [ 775: 778] Signal 775, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.724608 30218 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.724622 30218 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.724641 30218 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.724656 30218 task_signals.go:204] [ 775: 776] Signal 775, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.724667 30218 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.724675 30218 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.724680 30218 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.724691 30218 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.726019 30218 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.726050 30218 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.726065 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.726101 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.726116 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.726208 30218 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.726751 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.728015 30218 syscalls.go:262] [ 780: 780] Allocating stack with size of 8388608 bytes D0712 20:23:44.728147 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.730067 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.730120 30218 usertrap_amd64.go:106] [ 780: 780] Map a usertrap vma at 66000 D0712 20:23:44.730202 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 1 D0712 20:23:44.730221 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:44.731646 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.731675 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 2 D0712 20:23:44.731689 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:44.732429 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.732455 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 3 D0712 20:23:44.732462 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:44.738415 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.738480 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 4 D0712 20:23:44.738498 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:44.739723 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.739761 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 5 D0712 20:23:44.739776 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:44.739827 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.739834 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 6 D0712 20:23:44.739842 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:44.740005 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.740023 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 7 D0712 20:23:44.740030 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:44.740182 30218 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.740221 30218 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc00052c390 8 D0712 20:23:44.740234 30218 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:44.740345 30218 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.740366 30218 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc00052c390 9 D0712 20:23:44.740376 30218 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:44.740525 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.740544 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 10 D0712 20:23:44.740556 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:44.748612 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.748650 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 11 D0712 20:23:44.748680 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:44.751096 30218 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.751180 30218 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc00052c390 12 D0712 20:23:44.751228 30218 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:44.751275 30218 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.751283 30218 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc00052c390 13 D0712 20:23:44.751291 30218 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:44.751307 30218 task_signals.go:470] [ 780: 780] Notified of signal 23 D0712 20:23:44.751402 30218 task_signals.go:220] [ 780: 780] Signal 23: delivering to handler D0712 20:23:44.759119 30218 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.759184 30218 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc00052c390 14 D0712 20:23:44.759201 30218 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:44.759272 30218 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.759338 30218 task_signals.go:204] [ 780: 781] Signal 780, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.759331 30218 task_signals.go:204] [ 780: 782] Signal 780, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.759378 30218 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.759426 30218 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.759453 30218 task_signals.go:204] [ 780: 783] Signal 780, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.759477 30218 task_signals.go:204] [ 780: 784] Signal 780, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.759511 30218 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.759536 30218 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.759550 30218 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.759561 30218 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.759569 30218 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.759579 30218 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.759589 30218 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.759594 30218 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.759603 30218 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.760746 30218 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.760793 30218 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.760807 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.760834 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.760843 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.760917 30218 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.761541 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.762824 30218 syscalls.go:262] [ 785: 785] Allocating stack with size of 8388608 bytes D0712 20:23:44.762989 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.764498 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.764541 30218 usertrap_amd64.go:106] [ 785: 785] Map a usertrap vma at 68000 D0712 20:23:44.764636 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 1 D0712 20:23:44.764677 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:44.765146 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.765170 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 2 D0712 20:23:44.765181 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:44.765703 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.765727 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 3 D0712 20:23:44.765737 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:44.771119 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.771147 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 4 D0712 20:23:44.771159 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:44.772415 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.772450 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 5 D0712 20:23:44.772462 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:44.772540 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.772570 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 6 D0712 20:23:44.772585 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:44.772837 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.772862 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 7 D0712 20:23:44.772871 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:44.773064 30218 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.773085 30218 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc0005bf110 8 D0712 20:23:44.773095 30218 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:44.773311 30218 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.773327 30218 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc0005bf110 9 D0712 20:23:44.773335 30218 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:44.773498 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.773513 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 10 D0712 20:23:44.773524 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:44.780560 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.780592 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 11 D0712 20:23:44.780608 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:44.783802 30218 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.783833 30218 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc0005bf110 12 D0712 20:23:44.783847 30218 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:44.783900 30218 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.783925 30218 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc0005bf110 13 D0712 20:23:44.783937 30218 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:44.783984 30218 task_signals.go:470] [ 785: 785] Notified of signal 23 D0712 20:23:44.784063 30218 task_signals.go:220] [ 785: 785] Signal 23: delivering to handler D0712 20:23:44.790275 30218 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.790306 30218 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc0005bf110 14 D0712 20:23:44.790315 30218 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:44.790355 30218 task_exit.go:204] [ 785: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.790373 30218 task_exit.go:204] [ 785: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.790415 30218 task_signals.go:204] [ 785: 788] Signal 785, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.790429 30218 task_signals.go:204] [ 785: 786] Signal 785, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.790444 30218 task_exit.go:204] [ 785: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.790498 30218 task_exit.go:204] [ 785: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.790505 30218 task_exit.go:204] [ 785: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.790521 30218 task_signals.go:204] [ 785: 787] Signal 785, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.790541 30218 task_exit.go:204] [ 785: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.790549 30218 task_exit.go:204] [ 785: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.790555 30218 task_exit.go:204] [ 785: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.790565 30218 task_exit.go:204] [ 785: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.790572 30218 task_exit.go:204] [ 785: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.790581 30218 task_exit.go:204] [ 785: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.790594 30218 task_signals.go:204] [ 785: 789] Signal 785, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.790611 30218 task_exit.go:204] [ 785: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.791712 30218 task_exit.go:204] [ 785: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.791739 30218 task_exit.go:204] [ 785: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.791748 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.791792 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.791831 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.791867 30218 task_exit.go:204] [ 785: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.792386 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.793776 30218 syscalls.go:262] [ 790: 790] Allocating stack with size of 8388608 bytes D0712 20:23:44.793917 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.794818 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.794870 30218 usertrap_amd64.go:106] [ 790: 790] Map a usertrap vma at 6a000 D0712 20:23:44.795318 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 1 D0712 20:23:44.795357 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:44.795661 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.795683 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 2 D0712 20:23:44.795694 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:44.796383 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.796461 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 3 D0712 20:23:44.796483 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:44.802793 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.802841 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 4 D0712 20:23:44.802860 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:44.804003 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.804047 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 5 D0712 20:23:44.804063 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:44.804122 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.804137 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 6 D0712 20:23:44.804148 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:44.804439 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.804460 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 7 D0712 20:23:44.804470 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:44.804642 30218 usertrap_amd64.go:212] [ 790: 791] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.804970 30218 usertrap_amd64.go:122] [ 790: 791] Allocate a new trap: 0xc0006d5e60 8 D0712 20:23:44.805058 30218 usertrap_amd64.go:225] [ 790: 791] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:44.805214 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.805279 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 9 D0712 20:23:44.805304 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:44.805461 30218 usertrap_amd64.go:212] [ 790: 791] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.805518 30218 usertrap_amd64.go:122] [ 790: 791] Allocate a new trap: 0xc0006d5e60 10 D0712 20:23:44.805529 30218 usertrap_amd64.go:225] [ 790: 791] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:44.813430 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.813466 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 11 D0712 20:23:44.813482 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:44.817034 30218 usertrap_amd64.go:212] [ 790: 791] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.817151 30218 usertrap_amd64.go:122] [ 790: 791] Allocate a new trap: 0xc0006d5e60 12 D0712 20:23:44.817172 30218 usertrap_amd64.go:225] [ 790: 791] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:44.817268 30218 usertrap_amd64.go:212] [ 790: 791] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.817318 30218 usertrap_amd64.go:122] [ 790: 791] Allocate a new trap: 0xc0006d5e60 13 D0712 20:23:44.817339 30218 usertrap_amd64.go:225] [ 790: 791] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:44.817468 30218 task_signals.go:470] [ 790: 790] Notified of signal 23 D0712 20:23:44.817576 30218 task_signals.go:220] [ 790: 790] Signal 23: delivering to handler D0712 20:23:44.823985 30218 usertrap_amd64.go:212] [ 790: 790] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.824021 30218 usertrap_amd64.go:122] [ 790: 790] Allocate a new trap: 0xc0006d5e60 14 D0712 20:23:44.824036 30218 usertrap_amd64.go:225] [ 790: 790] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:44.824094 30218 task_exit.go:204] [ 790: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.824159 30218 task_exit.go:204] [ 790: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.824162 30218 task_signals.go:204] [ 790: 793] Signal 790, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.824185 30218 task_exit.go:204] [ 790: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.824183 30218 task_signals.go:204] [ 790: 792] Signal 790, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.824196 30218 task_exit.go:204] [ 790: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.824204 30218 task_exit.go:204] [ 790: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.824210 30218 task_exit.go:204] [ 790: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.824250 30218 task_signals.go:204] [ 790: 791] Signal 790, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.824281 30218 task_exit.go:204] [ 790: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.824297 30218 task_exit.go:204] [ 790: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.824266 30218 task_signals.go:204] [ 790: 794] Signal 790, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.824307 30218 task_exit.go:204] [ 790: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.824318 30218 task_exit.go:204] [ 790: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.824338 30218 task_exit.go:204] [ 790: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.824350 30218 task_exit.go:204] [ 790: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.825528 30218 task_exit.go:204] [ 790: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.825556 30218 task_exit.go:204] [ 790: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.825571 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.825627 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.825646 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.825932 30218 task_exit.go:204] [ 790: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.826370 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.827817 30218 syscalls.go:262] [ 795: 795] Allocating stack with size of 8388608 bytes D0712 20:23:44.828068 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.829383 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.829429 30218 usertrap_amd64.go:106] [ 795: 795] Map a usertrap vma at 64000 D0712 20:23:44.829535 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 1 D0712 20:23:44.829559 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:44.829967 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.829996 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 2 D0712 20:23:44.830008 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:44.830497 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.830517 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 3 D0712 20:23:44.830525 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:44.836073 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.836101 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 4 D0712 20:23:44.836111 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:44.837424 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.837456 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 5 D0712 20:23:44.837469 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:44.837536 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.837544 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 6 D0712 20:23:44.837554 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:44.837742 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.837765 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 7 D0712 20:23:44.837780 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:44.837981 30218 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.837994 30218 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc000ac3590 8 D0712 20:23:44.838004 30218 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:44.838268 30218 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.838297 30218 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc000ac3590 9 D0712 20:23:44.838310 30218 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:44.838478 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.838593 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 10 D0712 20:23:44.838653 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:44.846199 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.846235 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 11 D0712 20:23:44.846246 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:44.849742 30218 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.849780 30218 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc000ac3590 12 D0712 20:23:44.849791 30218 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:44.849853 30218 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.849875 30218 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc000ac3590 13 D0712 20:23:44.849882 30218 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:44.849923 30218 task_signals.go:470] [ 795: 795] Notified of signal 23 D0712 20:23:44.849975 30218 task_signals.go:220] [ 795: 795] Signal 23: delivering to handler D0712 20:23:44.855890 30218 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.855952 30218 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000ac3590 14 D0712 20:23:44.855971 30218 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:44.856011 30218 task_exit.go:204] [ 795: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.856044 30218 task_signals.go:204] [ 795: 796] Signal 795, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.856083 30218 task_signals.go:204] [ 795: 799] Signal 795, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.856094 30218 task_signals.go:204] [ 795: 798] Signal 795, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.856099 30218 task_signals.go:204] [ 795: 797] Signal 795, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.856123 30218 task_exit.go:204] [ 795: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.856161 30218 task_exit.go:204] [ 795: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.856176 30218 task_exit.go:204] [ 795: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.856180 30218 task_exit.go:204] [ 795: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.856190 30218 task_exit.go:204] [ 795: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.856196 30218 task_exit.go:204] [ 795: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.856200 30218 task_exit.go:204] [ 795: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.856207 30218 task_exit.go:204] [ 795: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.856212 30218 task_exit.go:204] [ 795: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.856215 30218 task_exit.go:204] [ 795: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.856221 30218 task_exit.go:204] [ 795: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.857364 30218 task_exit.go:204] [ 795: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.857393 30218 task_exit.go:204] [ 795: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.857412 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.857434 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.857440 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.857546 30218 task_exit.go:204] [ 795: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.858196 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.859457 30218 syscalls.go:262] [ 800: 800] Allocating stack with size of 8388608 bytes D0712 20:23:44.859594 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.860834 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.860892 30218 usertrap_amd64.go:106] [ 800: 800] Map a usertrap vma at 62000 D0712 20:23:44.861019 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 1 D0712 20:23:44.861069 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:44.861420 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.861459 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 2 D0712 20:23:44.861475 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:44.862085 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.862116 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 3 D0712 20:23:44.862130 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:44.867869 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.867913 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 4 D0712 20:23:44.867927 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:44.869024 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.869064 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 5 D0712 20:23:44.869078 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:44.869141 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.869172 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 6 D0712 20:23:44.869180 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:44.869761 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.869790 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 7 D0712 20:23:44.869800 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:44.870029 30218 usertrap_amd64.go:212] [ 800: 801] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.870054 30218 usertrap_amd64.go:122] [ 800: 801] Allocate a new trap: 0xc00052c810 8 D0712 20:23:44.870064 30218 usertrap_amd64.go:225] [ 800: 801] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:44.870472 30218 usertrap_amd64.go:212] [ 800: 801] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.870506 30218 usertrap_amd64.go:122] [ 800: 801] Allocate a new trap: 0xc00052c810 9 D0712 20:23:44.870518 30218 usertrap_amd64.go:225] [ 800: 801] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:44.870603 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.870619 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 10 D0712 20:23:44.870626 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:44.877821 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.877856 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 11 D0712 20:23:44.877872 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:44.881044 30218 usertrap_amd64.go:212] [ 800: 801] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.881083 30218 usertrap_amd64.go:122] [ 800: 801] Allocate a new trap: 0xc00052c810 12 D0712 20:23:44.881100 30218 usertrap_amd64.go:225] [ 800: 801] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:44.881158 30218 usertrap_amd64.go:212] [ 800: 801] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.881167 30218 usertrap_amd64.go:122] [ 800: 801] Allocate a new trap: 0xc00052c810 13 D0712 20:23:44.881177 30218 usertrap_amd64.go:225] [ 800: 801] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:44.881241 30218 task_signals.go:470] [ 800: 800] Notified of signal 23 D0712 20:23:44.881342 30218 task_signals.go:220] [ 800: 800] Signal 23: delivering to handler D0712 20:23:44.888599 30218 usertrap_amd64.go:212] [ 800: 800] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.888649 30218 usertrap_amd64.go:122] [ 800: 800] Allocate a new trap: 0xc00052c810 14 D0712 20:23:44.888661 30218 usertrap_amd64.go:225] [ 800: 800] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:44.888719 30218 task_exit.go:204] [ 800: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.888745 30218 task_exit.go:204] [ 800: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.888776 30218 task_signals.go:204] [ 800: 803] Signal 800, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.888793 30218 task_exit.go:204] [ 800: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.888771 30218 task_signals.go:204] [ 800: 802] Signal 800, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.888801 30218 task_exit.go:204] [ 800: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.888833 30218 task_exit.go:204] [ 800: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.888865 30218 task_signals.go:204] [ 800: 801] Signal 800, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.888876 30218 task_exit.go:204] [ 800: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.888884 30218 task_signals.go:204] [ 800: 804] Signal 800, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.888899 30218 task_exit.go:204] [ 800: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.888903 30218 task_exit.go:204] [ 800: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.888914 30218 task_exit.go:204] [ 800: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.888990 30218 task_exit.go:204] [ 800: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.888999 30218 task_exit.go:204] [ 800: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.889014 30218 task_exit.go:204] [ 800: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.890109 30218 task_exit.go:204] [ 800: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.890135 30218 task_exit.go:204] [ 800: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.890153 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.890173 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.890183 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.890281 30218 task_exit.go:204] [ 800: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.890973 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.892461 30218 syscalls.go:262] [ 805: 805] Allocating stack with size of 8388608 bytes D0712 20:23:44.892718 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.894299 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.894359 30218 usertrap_amd64.go:106] [ 805: 805] Map a usertrap vma at 66000 D0712 20:23:44.894460 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 1 D0712 20:23:44.894484 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:44.894987 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.895069 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 2 D0712 20:23:44.895166 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:44.896178 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.896206 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 3 D0712 20:23:44.896220 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:44.903746 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.903785 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 4 D0712 20:23:44.903798 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:44.905003 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.905038 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 5 D0712 20:23:44.905050 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:44.905111 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.905121 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 6 D0712 20:23:44.905127 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:44.905502 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.905526 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 7 D0712 20:23:44.905532 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:44.905736 30218 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.905759 30218 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc000ac3710 8 D0712 20:23:44.905795 30218 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:44.906121 30218 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.906147 30218 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc000ac3710 9 D0712 20:23:44.906156 30218 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:44.906399 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.906428 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 10 D0712 20:23:44.906437 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:44.906600 30218 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.906635 30218 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc000ac3710 11 D0712 20:23:44.906645 30218 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:44.906709 30218 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.906719 30218 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc000ac3710 12 D0712 20:23:44.906727 30218 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:44.906747 30218 task_signals.go:470] [ 805: 808] Notified of signal 23 D0712 20:23:44.906792 30218 task_signals.go:179] [ 805: 808] Restarting syscall 202: interrupted by signal 23 D0712 20:23:44.906802 30218 task_signals.go:220] [ 805: 808] Signal 23: delivering to handler D0712 20:23:44.907092 30218 usertrap_amd64.go:212] [ 805: 806] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:44.907150 30218 usertrap_amd64.go:122] [ 805: 806] Allocate a new trap: 0xc000ac3710 13 D0712 20:23:44.907165 30218 usertrap_amd64.go:225] [ 805: 806] Apply the binary patch addr 46b6e0 trap addr 66410 ([184 24 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:44.914507 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.914534 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 14 D0712 20:23:44.914543 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46af29 trap addr 66460 ([184 37 1 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:44.917103 30218 task_signals.go:470] [ 805: 805] Notified of signal 23 D0712 20:23:44.917203 30218 task_signals.go:220] [ 805: 805] Signal 23: delivering to handler D0712 20:23:44.925793 30218 usertrap_amd64.go:212] [ 805: 805] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.925845 30218 usertrap_amd64.go:122] [ 805: 805] Allocate a new trap: 0xc000ac3710 15 D0712 20:23:44.925865 30218 usertrap_amd64.go:225] [ 805: 805] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 20:23:44.925927 30218 task_exit.go:204] [ 805: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.925967 30218 task_exit.go:204] [ 805: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.925983 30218 task_signals.go:204] [ 805: 807] Signal 805, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.926012 30218 task_signals.go:204] [ 805: 809] Signal 805, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.926020 30218 task_exit.go:204] [ 805: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.925993 30218 task_signals.go:204] [ 805: 808] Signal 805, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.926037 30218 task_signals.go:204] [ 805: 806] Signal 805, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.926047 30218 task_exit.go:204] [ 805: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.926070 30218 task_exit.go:204] [ 805: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.926084 30218 task_exit.go:204] [ 805: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.926092 30218 task_exit.go:204] [ 805: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.926103 30218 task_exit.go:204] [ 805: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.926113 30218 task_exit.go:204] [ 805: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.926140 30218 task_exit.go:204] [ 805: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.926146 30218 task_exit.go:204] [ 805: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.926165 30218 task_exit.go:204] [ 805: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.927324 30218 task_exit.go:204] [ 805: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.927359 30218 task_exit.go:204] [ 805: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.927372 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.927403 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.927411 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.927489 30218 task_exit.go:204] [ 805: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.928248 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.929603 30218 syscalls.go:262] [ 810: 810] Allocating stack with size of 8388608 bytes D0712 20:23:44.929754 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.930598 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.930634 30218 usertrap_amd64.go:106] [ 810: 810] Map a usertrap vma at 64000 D0712 20:23:44.930716 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 1 D0712 20:23:44.930748 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:44.931592 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.931635 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 2 D0712 20:23:44.931649 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:44.932671 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.932696 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 3 D0712 20:23:44.932730 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:44.938050 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.938079 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 4 D0712 20:23:44.938091 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:44.939236 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.939266 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 5 D0712 20:23:44.939278 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:44.939311 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.939316 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 6 D0712 20:23:44.939321 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:44.939739 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.939771 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 7 D0712 20:23:44.939782 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:44.940035 30218 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.940062 30218 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc0005bff50 8 D0712 20:23:44.940073 30218 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:44.940483 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.940499 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 9 D0712 20:23:44.940509 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:44.940531 30218 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.940586 30218 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc0005bff50 10 D0712 20:23:44.940613 30218 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:44.948009 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.948044 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 11 D0712 20:23:44.948057 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:44.951146 30218 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.951210 30218 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc0005bff50 12 D0712 20:23:44.951231 30218 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:44.951372 30218 usertrap_amd64.go:212] [ 810: 811] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.951490 30218 usertrap_amd64.go:122] [ 810: 811] Allocate a new trap: 0xc0005bff50 13 D0712 20:23:44.951551 30218 usertrap_amd64.go:225] [ 810: 811] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:44.951659 30218 task_signals.go:470] [ 810: 810] Notified of signal 23 D0712 20:23:44.951749 30218 task_signals.go:220] [ 810: 810] Signal 23: delivering to handler D0712 20:23:44.958063 30218 usertrap_amd64.go:212] [ 810: 810] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.958111 30218 usertrap_amd64.go:122] [ 810: 810] Allocate a new trap: 0xc0005bff50 14 D0712 20:23:44.958125 30218 usertrap_amd64.go:225] [ 810: 810] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:44.958196 30218 task_exit.go:204] [ 810: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.958272 30218 task_exit.go:204] [ 810: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.958277 30218 task_signals.go:204] [ 810: 814] Signal 810, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.958294 30218 task_signals.go:204] [ 810: 812] Signal 810, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.958300 30218 task_exit.go:204] [ 810: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.958309 30218 task_exit.go:204] [ 810: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.958315 30218 task_exit.go:204] [ 810: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.958328 30218 task_exit.go:204] [ 810: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.958336 30218 task_exit.go:204] [ 810: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.958356 30218 task_exit.go:204] [ 810: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.958388 30218 task_signals.go:204] [ 810: 813] Signal 810, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.958400 30218 task_exit.go:204] [ 810: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.958408 30218 task_signals.go:204] [ 810: 811] Signal 810, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.958420 30218 task_exit.go:204] [ 810: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.958426 30218 task_exit.go:204] [ 810: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.958435 30218 task_exit.go:204] [ 810: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.959723 30218 task_exit.go:204] [ 810: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.959760 30218 task_exit.go:204] [ 810: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.959780 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.959847 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.959871 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.960037 30218 task_exit.go:204] [ 810: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.960758 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.962148 30218 syscalls.go:262] [ 815: 815] Allocating stack with size of 8388608 bytes D0712 20:23:44.962423 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.965469 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.965550 30218 usertrap_amd64.go:106] [ 815: 815] Map a usertrap vma at 63000 D0712 20:23:44.965667 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 1 D0712 20:23:44.965749 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:44.966294 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:44.966324 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 2 D0712 20:23:44.966337 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:44.967104 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:44.967136 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 3 D0712 20:23:44.967152 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:44.973510 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:44.973552 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 4 D0712 20:23:44.973565 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:44.974635 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:44.974664 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 5 D0712 20:23:44.974673 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:44.974737 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b214:sysno 13 D0712 20:23:44.974742 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 6 D0712 20:23:44.974747 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:44.975091 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:44.975099 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 7 D0712 20:23:44.975104 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:44.975254 30218 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:44.975295 30218 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc000ac39e0 8 D0712 20:23:44.975309 30218 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:44.975607 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:44.975626 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 9 D0712 20:23:44.975636 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:44.975735 30218 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46af76:sysno 35 D0712 20:23:44.975792 30218 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc000ac39e0 10 D0712 20:23:44.975809 30218 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:44.983447 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46af29:sysno 293 D0712 20:23:44.983507 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 11 D0712 20:23:44.983521 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:44.987075 30218 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b020:sysno 39 D0712 20:23:44.987109 30218 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc000ac39e0 12 D0712 20:23:44.987122 30218 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:44.987188 30218 usertrap_amd64.go:212] [ 815: 816] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:44.987219 30218 usertrap_amd64.go:122] [ 815: 816] Allocate a new trap: 0xc000ac39e0 13 D0712 20:23:44.987262 30218 usertrap_amd64.go:225] [ 815: 816] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:44.987293 30218 task_signals.go:470] [ 815: 815] Notified of signal 23 D0712 20:23:44.987419 30218 task_signals.go:220] [ 815: 815] Signal 23: delivering to handler D0712 20:23:44.993258 30218 usertrap_amd64.go:212] [ 815: 815] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:44.993286 30218 usertrap_amd64.go:122] [ 815: 815] Allocate a new trap: 0xc000ac39e0 14 D0712 20:23:44.993310 30218 usertrap_amd64.go:225] [ 815: 815] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:44.993412 30218 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.993436 30218 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.993439 30218 task_signals.go:204] [ 815: 816] Signal 815, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.993476 30218 task_signals.go:204] [ 815: 818] Signal 815, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.993531 30218 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.993552 30218 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.993557 30218 task_exit.go:204] [ 815: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.993568 30218 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.993585 30218 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.993591 30218 task_exit.go:204] [ 815: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.993637 30218 task_signals.go:204] [ 815: 817] Signal 815, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.993659 30218 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.993667 30218 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.993673 30218 task_exit.go:204] [ 815: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.993724 30218 task_signals.go:204] [ 815: 819] Signal 815, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:44.993750 30218 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:44.995016 30218 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:44.995038 30218 task_exit.go:204] [ 815: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.995052 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:44.995143 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:44.995170 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:44.995234 30218 task_exit.go:204] [ 815: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:44.996155 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.997493 30218 syscalls.go:262] [ 820: 820] Allocating stack with size of 8388608 bytes D0712 20:23:44.997665 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:44.999688 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:44.999718 30218 usertrap_amd64.go:106] [ 820: 820] Map a usertrap vma at 63000 D0712 20:23:44.999797 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 1 D0712 20:23:44.999826 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:45.000201 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.000223 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 2 D0712 20:23:45.000232 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:45.000859 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.000912 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 3 D0712 20:23:45.001009 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:45.007158 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.007199 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 4 D0712 20:23:45.007229 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:45.008261 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.008299 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 5 D0712 20:23:45.008311 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:45.008349 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.008356 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 6 D0712 20:23:45.008363 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:45.008650 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.008678 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 7 D0712 20:23:45.008688 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:45.009006 30218 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.009039 30218 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc0001603c0 8 D0712 20:23:45.009049 30218 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:45.009291 30218 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.009312 30218 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc0001603c0 9 D0712 20:23:45.009322 30218 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:45.009380 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.009414 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 10 D0712 20:23:45.009431 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:45.016907 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.017001 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 11 D0712 20:23:45.017018 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:45.020287 30218 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.020320 30218 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc0001603c0 12 D0712 20:23:45.020334 30218 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:45.020417 30218 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.020439 30218 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc0001603c0 13 D0712 20:23:45.020450 30218 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:45.020492 30218 task_signals.go:470] [ 820: 820] Notified of signal 23 D0712 20:23:45.020563 30218 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler I0712 20:23:45.028284 30218 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0712 20:23:45.028398 30218 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.028416 30218 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc0001603c0 14 D0712 20:23:45.028441 30218 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:45.028527 30218 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.028558 30218 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.028578 30218 task_signals.go:204] [ 820: 823] Signal 820, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.028588 30218 task_signals.go:204] [ 820: 824] Signal 820, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.028596 30218 task_signals.go:204] [ 820: 822] Signal 820, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.028609 30218 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.028619 30218 task_signals.go:204] [ 820: 821] Signal 820, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.028632 30218 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.028639 30218 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.028652 30218 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.028662 30218 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.028687 30218 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.028703 30218 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.028747 30218 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.028753 30218 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.028761 30218 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.030087 30218 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.030115 30218 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.030128 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.030181 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.030242 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.030420 30218 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.031323 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.032600 30218 syscalls.go:262] [ 825: 825] Allocating stack with size of 8388608 bytes D0712 20:23:45.032775 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.033826 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.033866 30218 usertrap_amd64.go:106] [ 825: 825] Map a usertrap vma at 69000 D0712 20:23:45.033942 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 1 D0712 20:23:45.033997 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:45.034706 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.034784 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 2 D0712 20:23:45.034809 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:45.035339 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.035379 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 3 D0712 20:23:45.035389 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:45.041528 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.041559 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 4 D0712 20:23:45.041572 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:45.042776 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.042804 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 5 D0712 20:23:45.042815 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:45.042883 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.042901 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 6 D0712 20:23:45.042906 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:45.043297 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.043310 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 7 D0712 20:23:45.043319 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:45.043505 30218 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.043532 30218 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc000d985d0 8 D0712 20:23:45.043542 30218 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:45.043646 30218 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.043662 30218 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc000d985d0 9 D0712 20:23:45.043673 30218 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:45.043697 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.043704 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 10 D0712 20:23:45.044858 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:45.045437 30218 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.045476 30218 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc000d985d0 11 D0712 20:23:45.045488 30218 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:45.045545 30218 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.045602 30218 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc000d985d0 12 D0712 20:23:45.045621 30218 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:45.045649 30218 task_signals.go:470] [ 825: 825] Notified of signal 23 D0712 20:23:45.045699 30218 task_signals.go:220] [ 825: 825] Signal 23: delivering to handler D0712 20:23:45.052383 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.052423 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 13 D0712 20:23:45.052438 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:45.055892 30218 task_signals.go:470] [ 825: 825] Notified of signal 23 D0712 20:23:45.055926 30218 task_signals.go:220] [ 825: 825] Signal 23: delivering to handler I0712 20:23:45.062974 30218 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0712 20:23:45.063094 30218 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.063112 30218 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc000d985d0 14 D0712 20:23:45.063139 30218 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:45.063286 30218 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.063348 30218 task_signals.go:204] [ 825: 827] Signal 825, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.063471 30218 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.063509 30218 task_signals.go:204] [ 825: 829] Signal 825, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.063524 30218 task_signals.go:204] [ 825: 826] Signal 825, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.063533 30218 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.063549 30218 task_signals.go:204] [ 825: 828] Signal 825, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.063564 30218 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.063569 30218 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.063583 30218 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.063603 30218 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.063609 30218 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.063620 30218 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.063644 30218 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.063651 30218 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.063662 30218 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.065008 30218 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.065037 30218 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.065068 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.065311 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.065383 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.065440 30218 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.066058 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.067685 30218 syscalls.go:262] [ 830: 830] Allocating stack with size of 8388608 bytes D0712 20:23:45.067892 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.070592 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.070649 30218 usertrap_amd64.go:106] [ 830: 830] Map a usertrap vma at 66000 D0712 20:23:45.070781 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 1 D0712 20:23:45.070817 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:45.071220 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.071337 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 2 D0712 20:23:45.071353 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:45.072080 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.072109 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 3 D0712 20:23:45.072121 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:45.078768 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.078798 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 4 D0712 20:23:45.078808 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:45.080047 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.080071 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 5 D0712 20:23:45.080080 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:45.080139 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.080161 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 6 D0712 20:23:45.080170 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:45.080522 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.080548 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 7 D0712 20:23:45.080555 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:45.080738 30218 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.080783 30218 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000d98690 8 D0712 20:23:45.080801 30218 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:45.081111 30218 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.081167 30218 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000d98690 9 D0712 20:23:45.081181 30218 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:45.081196 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.081202 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 10 D0712 20:23:45.081209 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:45.081434 30218 usertrap_amd64.go:212] [ 830: 833] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.081463 30218 usertrap_amd64.go:122] [ 830: 833] Allocate a new trap: 0xc000d98690 11 D0712 20:23:45.081498 30218 usertrap_amd64.go:225] [ 830: 833] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:45.088848 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.088879 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 12 D0712 20:23:45.088890 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:45.092578 30218 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.092613 30218 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000d98690 13 D0712 20:23:45.092624 30218 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:45.092720 30218 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.092745 30218 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc000d98690 14 D0712 20:23:45.092756 30218 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:45.092894 30218 task_signals.go:470] [ 830: 830] Notified of signal 23 D0712 20:23:45.093016 30218 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler I0712 20:23:45.099330 30218 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0712 20:23:45.099413 30218 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.099424 30218 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc000d98690 15 D0712 20:23:45.099433 30218 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 20:23:45.099473 30218 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.099508 30218 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.099539 30218 task_signals.go:204] [ 830: 833] Signal 830, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.099554 30218 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.099537 30218 task_signals.go:204] [ 830: 832] Signal 830, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.099563 30218 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.099570 30218 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.099586 30218 task_signals.go:204] [ 830: 834] Signal 830, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.099592 30218 task_signals.go:204] [ 830: 831] Signal 830, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.099612 30218 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.099635 30218 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.099643 30218 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.099653 30218 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.099671 30218 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.099677 30218 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.099689 30218 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.100975 30218 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.101088 30218 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.101161 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.101228 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.101248 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.101440 30218 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.101960 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.103259 30218 syscalls.go:262] [ 835: 835] Allocating stack with size of 8388608 bytes D0712 20:23:45.103374 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.104636 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.104678 30218 usertrap_amd64.go:106] [ 835: 835] Map a usertrap vma at 69000 D0712 20:23:45.104785 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 1 D0712 20:23:45.104822 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:45.105312 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.105347 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 2 D0712 20:23:45.105363 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:45.106022 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.106039 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 3 D0712 20:23:45.106051 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:45.118161 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.118217 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 4 D0712 20:23:45.118235 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:45.119433 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.119479 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 5 D0712 20:23:45.119498 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:45.119559 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.119581 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 6 D0712 20:23:45.119590 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:45.120076 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.120103 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 7 D0712 20:23:45.120112 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:45.120294 30218 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.120311 30218 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc000d98de0 8 D0712 20:23:45.120322 30218 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:45.120482 30218 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.120498 30218 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc000d98de0 9 D0712 20:23:45.120504 30218 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:45.120520 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.120524 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 10 D0712 20:23:45.120528 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:45.121213 30218 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.121243 30218 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc000d98de0 11 D0712 20:23:45.121255 30218 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:45.121384 30218 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.121410 30218 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc000d98de0 12 D0712 20:23:45.121420 30218 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:45.121468 30218 task_signals.go:470] [ 835: 835] Notified of signal 23 D0712 20:23:45.121507 30218 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler D0712 20:23:45.129286 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.129339 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 13 D0712 20:23:45.129355 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:45.133026 30218 task_signals.go:470] [ 835: 835] Notified of signal 23 D0712 20:23:45.133144 30218 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler D0712 20:23:45.142438 30218 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.142484 30218 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc000d98de0 14 D0712 20:23:45.142504 30218 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:45.142573 30218 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.142599 30218 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.142684 30218 task_signals.go:204] [ 835: 839] Signal 835, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.142724 30218 task_signals.go:204] [ 835: 837] Signal 835, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.142737 30218 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.142718 30218 task_signals.go:204] [ 835: 836] Signal 835, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.142770 30218 task_signals.go:204] [ 835: 838] Signal 835, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.142786 30218 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.142850 30218 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.142873 30218 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.142889 30218 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.142924 30218 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.142932 30218 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.142972 30218 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.143076 30218 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.143138 30218 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.144823 30218 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.144858 30218 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.144875 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.144911 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.144922 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.145158 30218 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.146003 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.147602 30218 syscalls.go:262] [ 840: 840] Allocating stack with size of 8388608 bytes D0712 20:23:45.147795 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.149048 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.149098 30218 usertrap_amd64.go:106] [ 840: 840] Map a usertrap vma at 67000 D0712 20:23:45.149245 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 1 D0712 20:23:45.149276 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:45.149719 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.149748 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 2 D0712 20:23:45.149760 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:45.150578 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.150630 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 3 D0712 20:23:45.150648 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:45.157344 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.157388 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 4 D0712 20:23:45.157403 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:45.158556 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.158593 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 5 D0712 20:23:45.158618 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:45.158687 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.158697 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 6 D0712 20:23:45.158707 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:45.159380 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.159433 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 7 D0712 20:23:45.159455 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:45.159684 30218 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.159709 30218 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc000b06d50 8 D0712 20:23:45.159723 30218 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:45.159996 30218 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.160024 30218 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc000b06d50 9 D0712 20:23:45.160035 30218 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:45.160061 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.160092 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 10 D0712 20:23:45.160116 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:45.167324 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.167387 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 11 D0712 20:23:45.167405 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:45.171132 30218 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.171180 30218 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc000b06d50 12 D0712 20:23:45.171199 30218 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:45.171276 30218 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.171318 30218 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc000b06d50 13 D0712 20:23:45.171333 30218 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:45.171408 30218 task_signals.go:470] [ 840: 840] Notified of signal 23 D0712 20:23:45.171490 30218 task_signals.go:220] [ 840: 840] Signal 23: delivering to handler I0712 20:23:45.177741 30218 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0712 20:23:45.177826 30218 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.177838 30218 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000b06d50 14 D0712 20:23:45.177849 30218 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:45.177887 30218 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.177939 30218 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.177974 30218 task_signals.go:204] [ 840: 841] Signal 840, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.177987 30218 task_signals.go:204] [ 840: 843] Signal 840, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.178004 30218 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.178035 30218 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.178052 30218 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.178073 30218 task_signals.go:204] [ 840: 844] Signal 840, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.178092 30218 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.178101 30218 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.178107 30218 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.178119 30218 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.178126 30218 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.178132 30218 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.178176 30218 task_signals.go:204] [ 840: 842] Signal 840, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.178198 30218 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.179443 30218 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.179471 30218 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.179484 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.179546 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.179571 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.179728 30218 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.180118 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.181400 30218 syscalls.go:262] [ 845: 845] Allocating stack with size of 8388608 bytes D0712 20:23:45.181591 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.184186 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.184235 30218 usertrap_amd64.go:106] [ 845: 845] Map a usertrap vma at 62000 D0712 20:23:45.184337 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 1 D0712 20:23:45.184364 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:45.184683 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.184716 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 2 D0712 20:23:45.184730 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:45.185299 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.185331 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 3 D0712 20:23:45.185349 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:45.190958 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.190986 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 4 D0712 20:23:45.190998 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:45.192051 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.192087 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 5 D0712 20:23:45.192101 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:45.192136 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.192143 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 6 D0712 20:23:45.192152 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:45.192321 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.192339 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 7 D0712 20:23:45.192345 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:45.192479 30218 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.192496 30218 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001cfc4e0 8 D0712 20:23:45.192503 30218 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:45.192700 30218 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.192731 30218 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001cfc4e0 9 D0712 20:23:45.192745 30218 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:45.192923 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.192986 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 10 D0712 20:23:45.192996 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:45.200025 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.200061 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 11 D0712 20:23:45.200073 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:45.203234 30218 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.203271 30218 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001cfc4e0 12 D0712 20:23:45.203288 30218 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:45.203348 30218 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.203365 30218 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001cfc4e0 13 D0712 20:23:45.203397 30218 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:45.203467 30218 task_signals.go:470] [ 845: 845] Notified of signal 23 D0712 20:23:45.203582 30218 task_signals.go:220] [ 845: 845] Signal 23: delivering to handler I0712 20:23:45.209892 30218 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0712 20:23:45.210011 30218 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.210026 30218 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001cfc4e0 14 D0712 20:23:45.210036 30218 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:45.210141 30218 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.210201 30218 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.210260 30218 task_signals.go:204] [ 845: 848] Signal 845, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.210306 30218 task_signals.go:204] [ 845: 846] Signal 845, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.210308 30218 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.210284 30218 task_signals.go:204] [ 845: 847] Signal 845, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.210308 30218 task_signals.go:204] [ 845: 849] Signal 845, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.210335 30218 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.210343 30218 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.210381 30218 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.210392 30218 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.210396 30218 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.210428 30218 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.210458 30218 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.210467 30218 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.210485 30218 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.211755 30218 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.211786 30218 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.211808 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.211844 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.211854 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.212030 30218 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.212897 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.214453 30218 syscalls.go:262] [ 850: 850] Allocating stack with size of 8388608 bytes D0712 20:23:45.214573 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.215811 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.215855 30218 usertrap_amd64.go:106] [ 850: 850] Map a usertrap vma at 69000 D0712 20:23:45.215998 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 1 D0712 20:23:45.216026 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:45.216721 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.216740 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 2 D0712 20:23:45.216754 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:45.217344 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.217371 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 3 D0712 20:23:45.217389 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:45.226561 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.226627 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 4 D0712 20:23:45.226649 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:45.228229 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.228286 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 5 D0712 20:23:45.228306 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:45.228375 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.228398 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 6 D0712 20:23:45.228415 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:45.228737 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.228759 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 7 D0712 20:23:45.228770 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:45.229020 30218 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.229055 30218 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc000d99080 8 D0712 20:23:45.229064 30218 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:45.229370 30218 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.229390 30218 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc000d99080 9 D0712 20:23:45.229402 30218 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:45.229507 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.229518 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 10 D0712 20:23:45.229526 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:45.229755 30218 usertrap_amd64.go:212] [ 850: 853] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.229787 30218 usertrap_amd64.go:122] [ 850: 853] Allocate a new trap: 0xc000d99080 11 D0712 20:23:45.229801 30218 usertrap_amd64.go:225] [ 850: 853] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:45.230447 30218 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.230467 30218 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc000d99080 12 D0712 20:23:45.230479 30218 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:45.230536 30218 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.230542 30218 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc000d99080 13 D0712 20:23:45.230549 30218 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:45.230591 30218 task_signals.go:470] [ 850: 850] Notified of signal 23 D0712 20:23:45.230637 30218 task_signals.go:220] [ 850: 850] Signal 23: delivering to handler D0712 20:23:45.238725 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.238751 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 14 D0712 20:23:45.238761 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46af29 trap addr 69460 ([184 37 1 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:45.241791 30218 task_signals.go:470] [ 850: 850] Notified of signal 23 D0712 20:23:45.241908 30218 task_signals.go:220] [ 850: 850] Signal 23: delivering to handler D0712 20:23:45.250769 30218 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.250798 30218 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d99080 15 D0712 20:23:45.250809 30218 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0712 20:23:45.250893 30218 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.250926 30218 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.250964 30218 task_signals.go:204] [ 850: 854] Signal 850, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.250975 30218 task_signals.go:204] [ 850: 852] Signal 850, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.251005 30218 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.250968 30218 task_signals.go:204] [ 850: 853] Signal 850, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.251046 30218 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.251023 30218 task_signals.go:204] [ 850: 851] Signal 850, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.251053 30218 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.251071 30218 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.251182 30218 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.251193 30218 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.251219 30218 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.251240 30218 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.251246 30218 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.251283 30218 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.253002 30218 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.253065 30218 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.253085 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.253131 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.253157 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.253229 30218 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.253964 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.255665 30218 syscalls.go:262] [ 855: 855] Allocating stack with size of 8388608 bytes D0712 20:23:45.255960 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.257557 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.257637 30218 usertrap_amd64.go:106] [ 855: 855] Map a usertrap vma at 68000 D0712 20:23:45.257805 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 1 D0712 20:23:45.257855 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:45.258484 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.258527 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 2 D0712 20:23:45.258548 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:45.259440 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.259471 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 3 D0712 20:23:45.259486 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:45.266638 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.266739 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 4 D0712 20:23:45.266805 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:45.268907 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.269023 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 5 D0712 20:23:45.269044 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:45.269265 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.269295 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 6 D0712 20:23:45.269306 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:45.269967 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.269994 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 7 D0712 20:23:45.270012 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:45.270245 30218 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.270267 30218 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc0001619e0 8 D0712 20:23:45.270278 30218 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:45.270714 30218 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.270798 30218 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc0001619e0 9 D0712 20:23:45.270838 30218 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:45.270970 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.271021 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 10 D0712 20:23:45.271040 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:45.282060 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.282124 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 11 D0712 20:23:45.282145 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:45.282694 30218 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.282741 30218 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc0001619e0 12 D0712 20:23:45.282822 30218 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:45.282912 30218 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.282921 30218 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc0001619e0 13 D0712 20:23:45.282931 30218 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:45.282955 30218 task_signals.go:470] [ 855: 855] Notified of signal 23 D0712 20:23:45.283072 30218 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler executing program D0712 20:23:45.294625 30218 task_signals.go:470] [ 855: 855] Notified of signal 23 D0712 20:23:45.296631 30218 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler I0712 20:23:45.297334 30218 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0712 20:23:45.297456 30218 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.297481 30218 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc0001619e0 14 D0712 20:23:45.297498 30218 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:45.297570 30218 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.297621 30218 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.297705 30218 task_signals.go:204] [ 855: 857] Signal 855, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.297735 30218 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.297746 30218 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.297753 30218 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.297656 30218 task_signals.go:204] [ 855: 856] Signal 855, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.297820 30218 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.297794 30218 task_signals.go:204] [ 855: 859] Signal 855, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.301150 30218 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.301386 30218 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.301141 30218 task_signals.go:204] [ 855: 860] Signal 855, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.298589 30218 task_signals.go:204] [ 855: 858] Signal 855, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.301451 30218 task_exit.go:204] [ 855: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.301590 30218 task_exit.go:204] [ 855: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.301649 30218 task_exit.go:204] [ 855: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.301762 30218 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.301888 30218 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.301901 30218 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.301950 30218 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.303820 30218 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.303893 30218 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.303917 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.304272 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.304388 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.304582 30218 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.305433 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.307439 30218 syscalls.go:262] [ 861: 861] Allocating stack with size of 8388608 bytes D0712 20:23:45.307732 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.310147 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.310238 30218 usertrap_amd64.go:106] [ 861: 861] Map a usertrap vma at 68000 D0712 20:23:45.310348 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 1 D0712 20:23:45.310391 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:45.312290 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.312331 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 2 D0712 20:23:45.312347 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:45.313370 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.313420 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 3 D0712 20:23:45.313444 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:45.321876 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.322018 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 4 D0712 20:23:45.322049 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:45.323381 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.323412 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 5 D0712 20:23:45.323425 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:45.323484 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.323491 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 6 D0712 20:23:45.323498 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:45.323696 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.323703 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 7 D0712 20:23:45.323710 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:45.323912 30218 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.323989 30218 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc00052c240 8 D0712 20:23:45.324013 30218 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:45.324150 30218 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.324165 30218 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc00052c240 9 D0712 20:23:45.324177 30218 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:45.324259 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.324275 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 10 D0712 20:23:45.324285 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:45.324796 30218 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.324825 30218 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc00052c240 11 D0712 20:23:45.324838 30218 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:45.324870 30218 usertrap_amd64.go:212] [ 861: 862] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.324878 30218 usertrap_amd64.go:122] [ 861: 862] Allocate a new trap: 0xc00052c240 12 D0712 20:23:45.324888 30218 usertrap_amd64.go:225] [ 861: 862] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:45.325033 30218 task_signals.go:470] [ 861: 861] Notified of signal 23 D0712 20:23:45.325145 30218 task_signals.go:220] [ 861: 861] Signal 23: delivering to handler D0712 20:23:45.332198 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.332241 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 13 D0712 20:23:45.332256 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:45.336055 30218 task_signals.go:470] [ 861: 861] Notified of signal 23 D0712 20:23:45.336106 30218 task_signals.go:220] [ 861: 861] Signal 23: delivering to handler I0712 20:23:45.344497 30218 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0712 20:23:45.344667 30218 usertrap_amd64.go:212] [ 861: 861] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.344685 30218 usertrap_amd64.go:122] [ 861: 861] Allocate a new trap: 0xc00052c240 14 D0712 20:23:45.344700 30218 usertrap_amd64.go:225] [ 861: 861] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:45.344763 30218 task_exit.go:204] [ 861: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.344815 30218 task_signals.go:204] [ 861: 862] Signal 861, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.344847 30218 task_exit.go:204] [ 861: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.344877 30218 task_signals.go:204] [ 861: 863] Signal 861, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.344897 30218 task_exit.go:204] [ 861: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.344906 30218 task_exit.go:204] [ 861: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.344907 30218 task_signals.go:204] [ 861: 864] Signal 861, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.344891 30218 task_signals.go:204] [ 861: 865] Signal 861, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.344919 30218 task_exit.go:204] [ 861: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.345057 30218 task_exit.go:204] [ 861: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.345096 30218 task_exit.go:204] [ 861: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.345113 30218 task_exit.go:204] [ 861: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.345125 30218 task_exit.go:204] [ 861: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.345134 30218 task_exit.go:204] [ 861: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.345147 30218 task_exit.go:204] [ 861: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.345157 30218 task_exit.go:204] [ 861: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.346417 30218 task_exit.go:204] [ 861: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.346456 30218 task_exit.go:204] [ 861: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.346477 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.346506 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.346516 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.346649 30218 task_exit.go:204] [ 861: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.347329 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.348616 30218 syscalls.go:262] [ 866: 866] Allocating stack with size of 8388608 bytes D0712 20:23:45.348725 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.350301 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.350345 30218 usertrap_amd64.go:106] [ 866: 866] Map a usertrap vma at 63000 D0712 20:23:45.350412 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 1 D0712 20:23:45.350444 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:45.350854 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.350884 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 2 D0712 20:23:45.350895 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:45.351390 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.351419 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 3 D0712 20:23:45.351430 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:45.358083 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.358124 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 4 D0712 20:23:45.358138 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:45.359487 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.359525 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 5 D0712 20:23:45.359540 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:45.359596 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.359604 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 6 D0712 20:23:45.359612 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:45.360007 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.360033 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 7 D0712 20:23:45.360044 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:45.360210 30218 usertrap_amd64.go:212] [ 866: 867] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.360256 30218 usertrap_amd64.go:122] [ 866: 867] Allocate a new trap: 0xc001cfc300 8 D0712 20:23:45.360268 30218 usertrap_amd64.go:225] [ 866: 867] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:45.360488 30218 usertrap_amd64.go:212] [ 866: 867] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.360507 30218 usertrap_amd64.go:122] [ 866: 867] Allocate a new trap: 0xc001cfc300 9 D0712 20:23:45.360518 30218 usertrap_amd64.go:225] [ 866: 867] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:45.360528 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.360534 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 10 D0712 20:23:45.360542 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:45.368007 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.368037 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 11 D0712 20:23:45.368048 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:45.370751 30218 usertrap_amd64.go:212] [ 866: 867] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.370766 30218 usertrap_amd64.go:122] [ 866: 867] Allocate a new trap: 0xc001cfc300 12 D0712 20:23:45.370776 30218 usertrap_amd64.go:225] [ 866: 867] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:45.370824 30218 usertrap_amd64.go:212] [ 866: 867] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.370842 30218 usertrap_amd64.go:122] [ 866: 867] Allocate a new trap: 0xc001cfc300 13 D0712 20:23:45.370851 30218 usertrap_amd64.go:225] [ 866: 867] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:45.370869 30218 task_signals.go:470] [ 866: 866] Notified of signal 23 D0712 20:23:45.370920 30218 task_signals.go:220] [ 866: 866] Signal 23: delivering to handler D0712 20:23:45.377745 30218 usertrap_amd64.go:212] [ 866: 866] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.377784 30218 usertrap_amd64.go:122] [ 866: 866] Allocate a new trap: 0xc001cfc300 14 D0712 20:23:45.377798 30218 usertrap_amd64.go:225] [ 866: 866] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:45.377845 30218 task_exit.go:204] [ 866: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.377868 30218 task_exit.go:204] [ 866: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.377906 30218 task_signals.go:204] [ 866: 867] Signal 866, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.377945 30218 task_exit.go:204] [ 866: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.377963 30218 task_exit.go:204] [ 866: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.377969 30218 task_exit.go:204] [ 866: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.377990 30218 task_signals.go:204] [ 866: 868] Signal 866, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.378001 30218 task_exit.go:204] [ 866: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.378059 30218 task_exit.go:204] [ 866: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.378081 30218 task_exit.go:204] [ 866: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.378099 30218 task_signals.go:204] [ 866: 869] Signal 866, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.378114 30218 task_exit.go:204] [ 866: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.378121 30218 task_exit.go:204] [ 866: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.378127 30218 task_exit.go:204] [ 866: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.378138 30218 task_signals.go:204] [ 866: 870] Signal 866, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.378191 30218 task_exit.go:204] [ 866: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.379341 30218 task_exit.go:204] [ 866: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.379369 30218 task_exit.go:204] [ 866: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.379388 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.379422 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.379468 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.379584 30218 task_exit.go:204] [ 866: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.380405 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.381877 30218 syscalls.go:262] [ 871: 871] Allocating stack with size of 8388608 bytes D0712 20:23:45.382016 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.384555 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.384638 30218 usertrap_amd64.go:106] [ 871: 871] Map a usertrap vma at 68000 D0712 20:23:45.384750 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 1 D0712 20:23:45.384787 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:45.385376 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.385408 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 2 D0712 20:23:45.385420 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:45.386127 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.386155 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 3 D0712 20:23:45.386166 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:45.392575 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.392660 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 4 D0712 20:23:45.392708 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:45.394194 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.394212 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 5 D0712 20:23:45.394223 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:45.394277 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.394289 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 6 D0712 20:23:45.394296 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:45.394466 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.394477 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 7 D0712 20:23:45.394485 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:45.394631 30218 usertrap_amd64.go:212] [ 871: 872] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.394644 30218 usertrap_amd64.go:122] [ 871: 872] Allocate a new trap: 0xc000972390 8 D0712 20:23:45.394653 30218 usertrap_amd64.go:225] [ 871: 872] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:45.394928 30218 usertrap_amd64.go:212] [ 871: 872] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.394964 30218 usertrap_amd64.go:122] [ 871: 872] Allocate a new trap: 0xc000972390 9 D0712 20:23:45.394974 30218 usertrap_amd64.go:225] [ 871: 872] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:45.395136 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.395153 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 10 D0712 20:23:45.395164 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:45.403625 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.403658 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 11 D0712 20:23:45.403668 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:45.406137 30218 usertrap_amd64.go:212] [ 871: 872] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.406204 30218 usertrap_amd64.go:122] [ 871: 872] Allocate a new trap: 0xc000972390 12 D0712 20:23:45.406224 30218 usertrap_amd64.go:225] [ 871: 872] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:45.406266 30218 usertrap_amd64.go:212] [ 871: 872] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.406277 30218 usertrap_amd64.go:122] [ 871: 872] Allocate a new trap: 0xc000972390 13 D0712 20:23:45.406285 30218 usertrap_amd64.go:225] [ 871: 872] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:45.406308 30218 task_signals.go:470] [ 871: 871] Notified of signal 23 D0712 20:23:45.406408 30218 task_signals.go:220] [ 871: 871] Signal 23: delivering to handler D0712 20:23:45.417309 30218 task_signals.go:470] [ 871: 871] Notified of signal 23 D0712 20:23:45.418907 30218 task_signals.go:220] [ 871: 871] Signal 23: delivering to handler D0712 20:23:45.423236 30218 usertrap_amd64.go:212] [ 871: 871] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.423267 30218 usertrap_amd64.go:122] [ 871: 871] Allocate a new trap: 0xc000972390 14 D0712 20:23:45.423283 30218 usertrap_amd64.go:225] [ 871: 871] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:45.423344 30218 task_exit.go:204] [ 871: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.423380 30218 task_exit.go:204] [ 871: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.423404 30218 task_signals.go:204] [ 871: 875] Signal 871, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.423420 30218 task_exit.go:204] [ 871: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.423435 30218 task_exit.go:204] [ 871: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.423441 30218 task_exit.go:204] [ 871: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.423416 30218 task_signals.go:204] [ 871: 873] Signal 871, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.423458 30218 task_signals.go:204] [ 871: 872] Signal 871, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.423431 30218 task_signals.go:204] [ 871: 874] Signal 871, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.423465 30218 task_exit.go:204] [ 871: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.423512 30218 task_exit.go:204] [ 871: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.423530 30218 task_exit.go:204] [ 871: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.423559 30218 task_exit.go:204] [ 871: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.423570 30218 task_exit.go:204] [ 871: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.423577 30218 task_exit.go:204] [ 871: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.423588 30218 task_exit.go:204] [ 871: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.424870 30218 task_exit.go:204] [ 871: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.424913 30218 task_exit.go:204] [ 871: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.424973 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.425034 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.425048 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.425213 30218 task_exit.go:204] [ 871: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.426040 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.427652 30218 syscalls.go:262] [ 876: 876] Allocating stack with size of 8388608 bytes D0712 20:23:45.427829 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.429022 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.429076 30218 usertrap_amd64.go:106] [ 876: 876] Map a usertrap vma at 60000 D0712 20:23:45.429186 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 1 D0712 20:23:45.429220 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:45.429601 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.429629 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 2 D0712 20:23:45.429640 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:45.430615 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.430637 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 3 D0712 20:23:45.430650 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:45.437732 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.437770 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 4 D0712 20:23:45.437781 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:45.438953 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.438984 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 5 D0712 20:23:45.438998 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:45.439050 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.439065 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 6 D0712 20:23:45.439074 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:45.439461 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.439494 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 7 D0712 20:23:45.439504 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:45.439689 30218 usertrap_amd64.go:212] [ 876: 877] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.439709 30218 usertrap_amd64.go:122] [ 876: 877] Allocate a new trap: 0xc000d98780 8 D0712 20:23:45.439718 30218 usertrap_amd64.go:225] [ 876: 877] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:45.439978 30218 usertrap_amd64.go:212] [ 876: 877] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.439992 30218 usertrap_amd64.go:122] [ 876: 877] Allocate a new trap: 0xc000d98780 9 D0712 20:23:45.440003 30218 usertrap_amd64.go:225] [ 876: 877] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:45.440099 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.440109 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 10 D0712 20:23:45.440118 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:45.450141 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.450185 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 11 D0712 20:23:45.450201 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:45.452771 30218 usertrap_amd64.go:212] [ 876: 877] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.452816 30218 usertrap_amd64.go:122] [ 876: 877] Allocate a new trap: 0xc000d98780 12 D0712 20:23:45.452834 30218 usertrap_amd64.go:225] [ 876: 877] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:45.453121 30218 usertrap_amd64.go:212] [ 876: 877] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.453157 30218 usertrap_amd64.go:122] [ 876: 877] Allocate a new trap: 0xc000d98780 13 D0712 20:23:45.453173 30218 usertrap_amd64.go:225] [ 876: 877] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:45.453237 30218 task_signals.go:470] [ 876: 876] Notified of signal 23 D0712 20:23:45.453305 30218 task_signals.go:220] [ 876: 876] Signal 23: delivering to handler D0712 20:23:45.462379 30218 usertrap_amd64.go:212] [ 876: 876] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.462440 30218 usertrap_amd64.go:122] [ 876: 876] Allocate a new trap: 0xc000d98780 14 D0712 20:23:45.462460 30218 usertrap_amd64.go:225] [ 876: 876] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:45.462496 30218 task_exit.go:204] [ 876: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.462531 30218 task_signals.go:204] [ 876: 880] Signal 876, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.462569 30218 task_signals.go:204] [ 876: 877] Signal 876, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.462573 30218 task_exit.go:204] [ 876: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.462649 30218 task_signals.go:204] [ 876: 878] Signal 876, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.462682 30218 task_signals.go:204] [ 876: 879] Signal 876, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.462732 30218 task_exit.go:204] [ 876: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.462743 30218 task_exit.go:204] [ 876: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.462764 30218 task_exit.go:204] [ 876: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.462781 30218 task_exit.go:204] [ 876: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.462789 30218 task_exit.go:204] [ 876: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.462793 30218 task_exit.go:204] [ 876: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.462799 30218 task_exit.go:204] [ 876: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.462805 30218 task_exit.go:204] [ 876: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.462809 30218 task_exit.go:204] [ 876: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.462817 30218 task_exit.go:204] [ 876: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.464104 30218 task_exit.go:204] [ 876: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.464137 30218 task_exit.go:204] [ 876: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.464151 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.464210 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.464222 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.464373 30218 task_exit.go:204] [ 876: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.464484 30218 task_signals.go:470] [ 7: 14] Notified of signal 23 D0712 20:23:45.464560 30218 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0712 20:23:45.465729 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.467528 30218 syscalls.go:262] [ 881: 881] Allocating stack with size of 8388608 bytes D0712 20:23:45.467679 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.469208 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.469309 30218 usertrap_amd64.go:106] [ 881: 881] Map a usertrap vma at 68000 D0712 20:23:45.469468 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 1 D0712 20:23:45.469545 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:45.470264 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.470303 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 2 D0712 20:23:45.470319 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:45.471034 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.471071 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 3 D0712 20:23:45.471085 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:45.484773 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.484816 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 4 D0712 20:23:45.484831 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:45.486130 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.486185 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 5 D0712 20:23:45.486202 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:45.486277 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.486295 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 6 D0712 20:23:45.486303 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:45.486908 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.486939 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 7 D0712 20:23:45.486958 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:45.487191 30218 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.487224 30218 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc000972780 8 D0712 20:23:45.487242 30218 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:45.487652 30218 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.487677 30218 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc000972780 9 D0712 20:23:45.487691 30218 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:45.487705 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.487714 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 10 D0712 20:23:45.487746 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:45.488546 30218 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.488572 30218 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc000972780 11 D0712 20:23:45.488585 30218 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:45.488658 30218 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.488716 30218 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc000972780 12 D0712 20:23:45.488732 30218 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:45.488791 30218 task_signals.go:470] [ 881: 881] Notified of signal 23 D0712 20:23:45.488865 30218 task_signals.go:220] [ 881: 881] Signal 23: delivering to handler D0712 20:23:45.496630 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.496663 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 13 D0712 20:23:45.496676 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:45.500804 30218 task_signals.go:470] [ 881: 881] Notified of signal 23 D0712 20:23:45.500852 30218 task_signals.go:220] [ 881: 881] Signal 23: delivering to handler D0712 20:23:45.507286 30218 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.507324 30218 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc000972780 14 D0712 20:23:45.507342 30218 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:45.507387 30218 task_exit.go:204] [ 881: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.507410 30218 task_exit.go:204] [ 881: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.507432 30218 task_signals.go:204] [ 881: 884] Signal 881, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.507432 30218 task_signals.go:204] [ 881: 883] Signal 881, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.507452 30218 task_signals.go:204] [ 881: 882] Signal 881, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.507472 30218 task_exit.go:204] [ 881: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.507480 30218 task_exit.go:204] [ 881: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.507493 30218 task_exit.go:204] [ 881: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.507499 30218 task_exit.go:204] [ 881: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.507468 30218 task_signals.go:204] [ 881: 885] Signal 881, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.507513 30218 task_exit.go:204] [ 881: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.507535 30218 task_exit.go:204] [ 881: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.507561 30218 task_exit.go:204] [ 881: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.507596 30218 task_exit.go:204] [ 881: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.507615 30218 task_exit.go:204] [ 881: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.507626 30218 task_exit.go:204] [ 881: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.508879 30218 task_exit.go:204] [ 881: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.508912 30218 task_exit.go:204] [ 881: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.508926 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.509010 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.509045 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.509288 30218 task_exit.go:204] [ 881: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.509722 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.511277 30218 syscalls.go:262] [ 886: 886] Allocating stack with size of 8388608 bytes D0712 20:23:45.511488 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.512475 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.512511 30218 usertrap_amd64.go:106] [ 886: 886] Map a usertrap vma at 68000 D0712 20:23:45.512584 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 1 D0712 20:23:45.512617 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:45.512822 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.512843 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 2 D0712 20:23:45.512852 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:45.513652 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.513686 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 3 D0712 20:23:45.513699 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:45.520688 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.520725 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 4 D0712 20:23:45.520748 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:45.521962 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.521995 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 5 D0712 20:23:45.522011 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:45.522079 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.522085 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 6 D0712 20:23:45.522092 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:45.522437 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.522450 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 7 D0712 20:23:45.522459 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:45.522601 30218 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.522621 30218 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc000972de0 8 D0712 20:23:45.522631 30218 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:45.522875 30218 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.522902 30218 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc000972de0 9 D0712 20:23:45.522912 30218 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:45.522955 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.522964 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 10 D0712 20:23:45.522973 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:45.522998 30218 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.523013 30218 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc000972de0 11 D0712 20:23:45.523067 30218 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:45.523720 30218 usertrap_amd64.go:212] [ 886: 887] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.523740 30218 usertrap_amd64.go:122] [ 886: 887] Allocate a new trap: 0xc000972de0 12 D0712 20:23:45.523750 30218 usertrap_amd64.go:225] [ 886: 887] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:45.523830 30218 task_signals.go:470] [ 886: 889] Notified of signal 23 D0712 20:23:45.523878 30218 task_signals.go:179] [ 886: 889] Restarting syscall 202: interrupted by signal 23 D0712 20:23:45.523895 30218 task_signals.go:220] [ 886: 889] Signal 23: delivering to handler D0712 20:23:45.531151 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.531186 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 13 D0712 20:23:45.531199 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:45.535669 30218 task_signals.go:470] [ 886: 886] Notified of signal 23 D0712 20:23:45.535739 30218 task_signals.go:220] [ 886: 886] Signal 23: delivering to handler D0712 20:23:45.541483 30218 usertrap_amd64.go:212] [ 886: 886] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.541538 30218 usertrap_amd64.go:122] [ 886: 886] Allocate a new trap: 0xc000972de0 14 D0712 20:23:45.541561 30218 usertrap_amd64.go:225] [ 886: 886] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:45.541623 30218 task_exit.go:204] [ 886: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.541647 30218 task_exit.go:204] [ 886: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.541675 30218 task_signals.go:204] [ 886: 887] Signal 886, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.541692 30218 task_exit.go:204] [ 886: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.541701 30218 task_exit.go:204] [ 886: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.541718 30218 task_exit.go:204] [ 886: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.541684 30218 task_signals.go:204] [ 886: 889] Signal 886, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.541743 30218 task_signals.go:204] [ 886: 888] Signal 886, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.541762 30218 task_exit.go:204] [ 886: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.541772 30218 task_signals.go:204] [ 886: 890] Signal 886, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.541785 30218 task_exit.go:204] [ 886: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.541791 30218 task_exit.go:204] [ 886: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.541811 30218 task_exit.go:204] [ 886: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.541821 30218 task_exit.go:204] [ 886: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.541827 30218 task_exit.go:204] [ 886: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.541835 30218 task_exit.go:204] [ 886: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.543044 30218 task_exit.go:204] [ 886: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.543085 30218 task_exit.go:204] [ 886: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.543100 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.543128 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.543148 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.543370 30218 task_exit.go:204] [ 886: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.543986 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.545373 30218 syscalls.go:262] [ 891: 891] Allocating stack with size of 8388608 bytes D0712 20:23:45.545487 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.546447 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.546489 30218 usertrap_amd64.go:106] [ 891: 891] Map a usertrap vma at 66000 D0712 20:23:45.546558 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 1 D0712 20:23:45.546577 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:45.546980 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.546995 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 2 D0712 20:23:45.547005 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:45.547598 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.547625 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 3 D0712 20:23:45.547640 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:45.552927 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.552981 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 4 D0712 20:23:45.552995 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:45.554113 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.554141 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 5 D0712 20:23:45.554150 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:45.554201 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.554207 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 6 D0712 20:23:45.554211 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:45.554400 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.554449 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 7 D0712 20:23:45.554455 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:45.554640 30218 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.554651 30218 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc000b06660 8 D0712 20:23:45.554660 30218 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:45.554824 30218 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.554867 30218 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc000b06660 9 D0712 20:23:45.554876 30218 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:45.554950 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.554984 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 10 D0712 20:23:45.555008 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:45.561895 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.561930 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 11 D0712 20:23:45.561943 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:45.565227 30218 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.565271 30218 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc000b06660 12 D0712 20:23:45.565286 30218 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:45.565339 30218 usertrap_amd64.go:212] [ 891: 892] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.565367 30218 usertrap_amd64.go:122] [ 891: 892] Allocate a new trap: 0xc000b06660 13 D0712 20:23:45.565381 30218 usertrap_amd64.go:225] [ 891: 892] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:45.565436 30218 task_signals.go:470] [ 891: 891] Notified of signal 23 D0712 20:23:45.565538 30218 task_signals.go:220] [ 891: 891] Signal 23: delivering to handler D0712 20:23:45.571518 30218 usertrap_amd64.go:212] [ 891: 891] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.571548 30218 usertrap_amd64.go:122] [ 891: 891] Allocate a new trap: 0xc000b06660 14 D0712 20:23:45.571560 30218 usertrap_amd64.go:225] [ 891: 891] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:45.571631 30218 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.571653 30218 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.571679 30218 task_signals.go:204] [ 891: 894] Signal 891, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.571678 30218 task_signals.go:204] [ 891: 893] Signal 891, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.571696 30218 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.571705 30218 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.571720 30218 task_exit.go:204] [ 891: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.571750 30218 task_signals.go:204] [ 891: 895] Signal 891, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.571772 30218 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.571808 30218 task_signals.go:204] [ 891: 892] Signal 891, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.571834 30218 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.571840 30218 task_exit.go:204] [ 891: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.571854 30218 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.571870 30218 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.571874 30218 task_exit.go:204] [ 891: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.571881 30218 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.572925 30218 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.572979 30218 task_exit.go:204] [ 891: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.573004 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.573038 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.573061 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.573137 30218 task_exit.go:204] [ 891: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.573805 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.575165 30218 syscalls.go:262] [ 896: 896] Allocating stack with size of 8388608 bytes D0712 20:23:45.575261 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.576506 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.576610 30218 usertrap_amd64.go:106] [ 896: 896] Map a usertrap vma at 61000 D0712 20:23:45.576718 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 1 D0712 20:23:45.576752 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:45.577434 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.577466 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 2 D0712 20:23:45.577482 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:45.577951 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.577973 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 3 D0712 20:23:45.577984 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:45.583621 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.583653 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 4 D0712 20:23:45.583664 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:45.584794 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.584843 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 5 D0712 20:23:45.584859 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:45.584927 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.584937 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 6 D0712 20:23:45.585000 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:45.585667 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.585691 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 7 D0712 20:23:45.585698 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:45.585844 30218 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.585870 30218 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc000b06930 8 D0712 20:23:45.585899 30218 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:45.586120 30218 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.586152 30218 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc000b06930 9 D0712 20:23:45.586164 30218 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:45.586178 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.586185 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 10 D0712 20:23:45.586193 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:45.586337 30218 usertrap_amd64.go:212] [ 896: 899] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.586385 30218 usertrap_amd64.go:122] [ 896: 899] Allocate a new trap: 0xc000b06930 11 D0712 20:23:45.586400 30218 usertrap_amd64.go:225] [ 896: 899] Apply the binary patch addr 46b6e0 trap addr 61370 ([184 24 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:45.586870 30218 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.586899 30218 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc000b06930 12 D0712 20:23:45.586911 30218 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:45.586973 30218 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.586993 30218 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc000b06930 13 D0712 20:23:45.587003 30218 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:45.587023 30218 task_signals.go:470] [ 896: 896] Notified of signal 23 D0712 20:23:45.587086 30218 task_signals.go:220] [ 896: 896] Signal 23: delivering to handler D0712 20:23:45.593332 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.593366 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 14 D0712 20:23:45.593375 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46af29 trap addr 61460 ([184 37 1 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:45.597556 30218 task_signals.go:470] [ 896: 896] Notified of signal 23 D0712 20:23:45.597617 30218 task_signals.go:220] [ 896: 896] Signal 23: delivering to handler D0712 20:23:45.607539 30218 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.607586 30218 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc000b06930 15 D0712 20:23:45.607604 30218 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 20:23:45.607672 30218 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.607703 30218 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.607731 30218 task_signals.go:204] [ 896: 900] Signal 896, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.607757 30218 task_signals.go:204] [ 896: 898] Signal 896, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.607741 30218 task_signals.go:204] [ 896: 901] Signal 896, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.607760 30218 task_signals.go:204] [ 896: 899] Signal 896, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.607785 30218 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.607860 30218 task_signals.go:204] [ 896: 897] Signal 896, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.607891 30218 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.607897 30218 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.607915 30218 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.607927 30218 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.607931 30218 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.607968 30218 task_exit.go:204] [ 896: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.608029 30218 task_exit.go:204] [ 896: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.608050 30218 task_exit.go:204] [ 896: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.608071 30218 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.608090 30218 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.608097 30218 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.608107 30218 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.609485 30218 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.609527 30218 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.609543 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.609615 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.609636 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.609801 30218 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.610303 30218 task_signals.go:470] [ 7: 10] Notified of signal 23 D0712 20:23:45.610396 30218 task_signals.go:220] [ 7: 10] Signal 23: delivering to handler D0712 20:23:45.610686 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.612120 30218 syscalls.go:262] [ 902: 902] Allocating stack with size of 8388608 bytes D0712 20:23:45.612235 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.613392 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.613434 30218 usertrap_amd64.go:106] [ 902: 902] Map a usertrap vma at 64000 D0712 20:23:45.613566 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 1 D0712 20:23:45.613621 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:45.614250 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.614279 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 2 D0712 20:23:45.614292 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:45.614972 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.614997 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 3 D0712 20:23:45.615007 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:45.622836 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.622871 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 4 D0712 20:23:45.622886 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:45.624051 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.624427 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 5 D0712 20:23:45.624455 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:45.624517 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.624523 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 6 D0712 20:23:45.624534 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:45.625095 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.625122 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 7 D0712 20:23:45.625132 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:45.625400 30218 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.625464 30218 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000b06e10 8 D0712 20:23:45.625517 30218 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:45.625784 30218 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.625814 30218 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000b06e10 9 D0712 20:23:45.625826 30218 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:45.625840 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.625847 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 10 D0712 20:23:45.625856 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:45.626468 30218 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.626496 30218 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000b06e10 11 D0712 20:23:45.626506 30218 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:45.626636 30218 usertrap_amd64.go:212] [ 902: 903] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.626670 30218 usertrap_amd64.go:122] [ 902: 903] Allocate a new trap: 0xc000b06e10 12 D0712 20:23:45.626688 30218 usertrap_amd64.go:225] [ 902: 903] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:45.626746 30218 task_signals.go:470] [ 902: 902] Notified of signal 23 D0712 20:23:45.626776 30218 task_signals.go:220] [ 902: 902] Signal 23: delivering to handler D0712 20:23:45.627085 30218 task_signals.go:470] [ 902: 902] Notified of signal 23 D0712 20:23:45.627176 30218 task_signals.go:220] [ 902: 902] Signal 23: delivering to handler D0712 20:23:45.634437 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.634474 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 13 D0712 20:23:45.634487 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:45.637580 30218 task_signals.go:470] [ 902: 902] Notified of signal 23 D0712 20:23:45.637663 30218 task_signals.go:220] [ 902: 902] Signal 23: delivering to handler D0712 20:23:45.646173 30218 usertrap_amd64.go:212] [ 902: 902] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.646227 30218 usertrap_amd64.go:122] [ 902: 902] Allocate a new trap: 0xc000b06e10 14 D0712 20:23:45.646247 30218 usertrap_amd64.go:225] [ 902: 902] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:45.646398 30218 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.646433 30218 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.646445 30218 task_signals.go:204] [ 902: 903] Signal 902, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.646464 30218 task_signals.go:204] [ 902: 905] Signal 902, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.646480 30218 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.646521 30218 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.646545 30218 task_exit.go:204] [ 902: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.646566 30218 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.646575 30218 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.646581 30218 task_exit.go:204] [ 902: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.646597 30218 task_signals.go:204] [ 902: 906] Signal 902, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.646610 30218 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.646617 30218 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.646623 30218 task_exit.go:204] [ 902: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.646637 30218 task_signals.go:204] [ 902: 904] Signal 902, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.646649 30218 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.648119 30218 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.648162 30218 task_exit.go:204] [ 902: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.648181 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.648212 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.648221 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.648379 30218 task_exit.go:204] [ 902: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.649211 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.650543 30218 syscalls.go:262] [ 907: 907] Allocating stack with size of 8388608 bytes D0712 20:23:45.650660 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.651848 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.651895 30218 usertrap_amd64.go:106] [ 907: 907] Map a usertrap vma at 61000 D0712 20:23:45.651971 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 1 D0712 20:23:45.651995 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:45.652534 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.652566 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 2 D0712 20:23:45.652581 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:45.653318 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.653347 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 3 D0712 20:23:45.653357 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:45.660992 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.661044 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 4 D0712 20:23:45.661060 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:45.662689 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.662746 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 5 D0712 20:23:45.662763 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:45.662885 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.662914 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 6 D0712 20:23:45.662926 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:45.663480 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.663514 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 7 D0712 20:23:45.663528 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:45.663753 30218 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.663775 30218 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc000b07230 8 D0712 20:23:45.663786 30218 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:45.664135 30218 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.664172 30218 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc000b07230 9 D0712 20:23:45.664186 30218 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:45.664256 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.664474 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 10 D0712 20:23:45.664489 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:45.673304 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.673333 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 11 D0712 20:23:45.673346 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:45.676093 30218 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.676159 30218 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc000b07230 12 D0712 20:23:45.676178 30218 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:45.676229 30218 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.676237 30218 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc000b07230 13 D0712 20:23:45.676247 30218 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:45.676312 30218 task_signals.go:470] [ 907: 907] Notified of signal 23 D0712 20:23:45.676404 30218 task_signals.go:220] [ 907: 907] Signal 23: delivering to handler D0712 20:23:45.684149 30218 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.684201 30218 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc000b07230 14 D0712 20:23:45.684219 30218 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:45.684282 30218 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.684414 30218 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.684461 30218 task_signals.go:204] [ 907: 909] Signal 907, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.684513 30218 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.684539 30218 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.684547 30218 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.684572 30218 task_signals.go:204] [ 907: 908] Signal 907, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.684584 30218 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.684592 30218 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.684597 30218 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.684612 30218 task_signals.go:204] [ 907: 910] Signal 907, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.684658 30218 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.684680 30218 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.684687 30218 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.684706 30218 task_signals.go:204] [ 907: 911] Signal 907, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.684733 30218 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.688019 30218 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.688056 30218 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.688080 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.688112 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.688141 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.688208 30218 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.688928 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.690536 30218 syscalls.go:262] [ 912: 912] Allocating stack with size of 8388608 bytes D0712 20:23:45.690754 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.691714 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.691761 30218 usertrap_amd64.go:106] [ 912: 912] Map a usertrap vma at 63000 D0712 20:23:45.691885 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 1 D0712 20:23:45.691924 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:45.692480 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.692503 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 2 D0712 20:23:45.692513 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:45.693106 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.693185 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 3 D0712 20:23:45.693210 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:45.700659 30218 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0712 20:23:45.700988 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.701041 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 4 D0712 20:23:45.701059 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:45.702359 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.702388 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 5 D0712 20:23:45.702398 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:45.702428 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.702433 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 6 D0712 20:23:45.702437 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:45.702627 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.702647 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 7 D0712 20:23:45.702655 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:45.702820 30218 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.702856 30218 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc00052d650 8 D0712 20:23:45.702872 30218 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:45.703012 30218 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.703025 30218 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc00052d650 9 D0712 20:23:45.703036 30218 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:45.703217 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.703247 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 10 D0712 20:23:45.703261 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:45.710936 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.710979 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 11 D0712 20:23:45.710992 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:45.713569 30218 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.713617 30218 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc00052d650 12 D0712 20:23:45.713635 30218 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:45.713712 30218 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.713724 30218 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc00052d650 13 D0712 20:23:45.713732 30218 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:45.713774 30218 task_signals.go:470] [ 912: 912] Notified of signal 23 D0712 20:23:45.713880 30218 task_signals.go:220] [ 912: 912] Signal 23: delivering to handler D0712 20:23:45.721561 30218 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.721595 30218 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc00052d650 14 D0712 20:23:45.721610 30218 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:45.721712 30218 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.721741 30218 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.721770 30218 task_signals.go:204] [ 912: 916] Signal 912, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.721763 30218 task_signals.go:204] [ 912: 914] Signal 912, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.721771 30218 task_signals.go:204] [ 912: 915] Signal 912, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.721787 30218 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.721815 30218 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.721830 30218 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.721855 30218 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.721865 30218 task_signals.go:204] [ 912: 913] Signal 912, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.721879 30218 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.721885 30218 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.721895 30218 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.721923 30218 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.721942 30218 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.721953 30218 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.723105 30218 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.723133 30218 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.723149 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.723173 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.723218 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.723396 30218 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.723907 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.725387 30218 syscalls.go:262] [ 917: 917] Allocating stack with size of 8388608 bytes D0712 20:23:45.725497 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.726785 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.726841 30218 usertrap_amd64.go:106] [ 917: 917] Map a usertrap vma at 68000 D0712 20:23:45.726908 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 1 D0712 20:23:45.726946 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:45.727341 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.727366 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 2 D0712 20:23:45.727381 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:45.728072 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.728087 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 3 D0712 20:23:45.728095 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:45.734683 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.734816 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 4 D0712 20:23:45.734852 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:45.736217 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.736253 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 5 D0712 20:23:45.736267 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:45.736335 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.736344 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 6 D0712 20:23:45.736352 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:45.736736 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.736756 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 7 D0712 20:23:45.736767 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:45.737020 30218 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.737041 30218 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000973620 8 D0712 20:23:45.737056 30218 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:45.737239 30218 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.737267 30218 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000973620 9 D0712 20:23:45.737281 30218 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:45.737311 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.737319 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 10 D0712 20:23:45.737354 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:45.745131 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.745173 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 11 D0712 20:23:45.745189 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:45.747700 30218 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.747749 30218 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000973620 12 D0712 20:23:45.747768 30218 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:45.747790 30218 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.747797 30218 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000973620 13 D0712 20:23:45.747807 30218 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:45.747826 30218 task_signals.go:470] [ 917: 917] Notified of signal 23 D0712 20:23:45.747909 30218 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0712 20:23:45.755936 30218 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.755977 30218 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000973620 14 D0712 20:23:45.755996 30218 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:45.756049 30218 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.756081 30218 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.756085 30218 task_signals.go:204] [ 917: 920] Signal 917, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.756103 30218 task_signals.go:204] [ 917: 921] Signal 917, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.756117 30218 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.756142 30218 task_signals.go:204] [ 917: 919] Signal 917, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.756168 30218 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.756176 30218 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.756192 30218 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.756211 30218 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.756218 30218 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.756230 30218 task_signals.go:204] [ 917: 918] Signal 917, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.756229 30218 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.756248 30218 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.756268 30218 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.756283 30218 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.757526 30218 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.757559 30218 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.757576 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.757634 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.757649 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.757696 30218 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.758341 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.760022 30218 syscalls.go:262] [ 922: 922] Allocating stack with size of 8388608 bytes D0712 20:23:45.760122 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.761871 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.761920 30218 usertrap_amd64.go:106] [ 922: 922] Map a usertrap vma at 6a000 D0712 20:23:45.762066 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 1 D0712 20:23:45.762118 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:45.762543 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.762561 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 2 D0712 20:23:45.762573 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:45.763851 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.763878 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 3 D0712 20:23:45.763892 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:45.769955 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.769991 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 4 D0712 20:23:45.770014 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:45.773804 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.773857 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 5 D0712 20:23:45.773871 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:45.773930 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.773935 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 6 D0712 20:23:45.773940 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:45.774280 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.774300 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 7 D0712 20:23:45.774308 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:45.774443 30218 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.774473 30218 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc000d996b0 8 D0712 20:23:45.774485 30218 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:45.774675 30218 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.774706 30218 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc000d996b0 9 D0712 20:23:45.774718 30218 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:45.774845 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.774873 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 10 D0712 20:23:45.774885 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:45.782308 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.782344 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 11 D0712 20:23:45.782359 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:45.785085 30218 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.785120 30218 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc000d996b0 12 D0712 20:23:45.785133 30218 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:45.785180 30218 usertrap_amd64.go:212] [ 922: 923] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.785207 30218 usertrap_amd64.go:122] [ 922: 923] Allocate a new trap: 0xc000d996b0 13 D0712 20:23:45.785219 30218 usertrap_amd64.go:225] [ 922: 923] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:45.785260 30218 task_signals.go:470] [ 922: 922] Notified of signal 23 D0712 20:23:45.785349 30218 task_signals.go:220] [ 922: 922] Signal 23: delivering to handler D0712 20:23:45.792790 30218 usertrap_amd64.go:212] [ 922: 922] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.792832 30218 usertrap_amd64.go:122] [ 922: 922] Allocate a new trap: 0xc000d996b0 14 D0712 20:23:45.792847 30218 usertrap_amd64.go:225] [ 922: 922] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:45.792906 30218 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.792976 30218 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.793015 30218 task_signals.go:204] [ 922: 924] Signal 922, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.793038 30218 task_signals.go:204] [ 922: 923] Signal 922, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.793044 30218 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.793077 30218 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.793098 30218 task_exit.go:204] [ 922: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.793016 30218 task_signals.go:204] [ 922: 925] Signal 922, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.793118 30218 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.793123 30218 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.793137 30218 task_exit.go:204] [ 922: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.793144 30218 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.793158 30218 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.793162 30218 task_exit.go:204] [ 922: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.793025 30218 task_signals.go:204] [ 922: 926] Signal 922, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.793173 30218 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.794547 30218 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.794569 30218 task_exit.go:204] [ 922: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.794584 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.794618 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.794645 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.794765 30218 task_exit.go:204] [ 922: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.795285 30218 task_stop.go:118] [ 7: 12] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.796644 30218 syscalls.go:262] [ 927: 927] Allocating stack with size of 8388608 bytes D0712 20:23:45.796741 30218 task_stop.go:138] [ 7: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.798290 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.798328 30218 usertrap_amd64.go:106] [ 927: 927] Map a usertrap vma at 63000 D0712 20:23:45.798396 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 1 D0712 20:23:45.798420 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:45.798712 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.798730 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 2 D0712 20:23:45.798736 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:45.799481 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.799515 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 3 D0712 20:23:45.799527 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:45.805690 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.805726 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 4 D0712 20:23:45.805740 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:45.806904 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.806937 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 5 D0712 20:23:45.806949 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:45.807014 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.807028 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 6 D0712 20:23:45.807034 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:45.807337 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.807351 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 7 D0712 20:23:45.807356 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:45.807496 30218 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.807524 30218 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc000d99710 8 D0712 20:23:45.807536 30218 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:45.807705 30218 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.807750 30218 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc000d99710 9 D0712 20:23:45.807769 30218 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:45.807803 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.807811 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 10 D0712 20:23:45.807820 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:45.817211 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.817278 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 11 D0712 20:23:45.817297 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:45.819534 30218 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.819571 30218 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc000d99710 12 D0712 20:23:45.819586 30218 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:45.819647 30218 usertrap_amd64.go:212] [ 927: 928] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.819669 30218 usertrap_amd64.go:122] [ 927: 928] Allocate a new trap: 0xc000d99710 13 D0712 20:23:45.819677 30218 usertrap_amd64.go:225] [ 927: 928] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:45.819710 30218 task_signals.go:470] [ 927: 927] Notified of signal 23 D0712 20:23:45.819832 30218 task_signals.go:220] [ 927: 927] Signal 23: delivering to handler D0712 20:23:45.827619 30218 usertrap_amd64.go:212] [ 927: 927] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.827671 30218 usertrap_amd64.go:122] [ 927: 927] Allocate a new trap: 0xc000d99710 14 D0712 20:23:45.827691 30218 usertrap_amd64.go:225] [ 927: 927] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:45.827770 30218 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.827805 30218 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.827854 30218 task_signals.go:204] [ 927: 928] Signal 927, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.827878 30218 task_signals.go:204] [ 927: 930] Signal 927, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.827891 30218 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.827932 30218 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.827943 30218 task_exit.go:204] [ 927: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.827960 30218 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.827976 30218 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.827980 30218 task_exit.go:204] [ 927: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.827992 30218 task_signals.go:204] [ 927: 931] Signal 927, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.828003 30218 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.828011 30218 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.828017 30218 task_exit.go:204] [ 927: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.828031 30218 task_signals.go:204] [ 927: 929] Signal 927, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.828052 30218 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.829229 30218 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.829260 30218 task_exit.go:204] [ 927: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.829273 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.829340 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.829383 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.829495 30218 task_exit.go:204] [ 927: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.829970 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.831635 30218 syscalls.go:262] [ 932: 932] Allocating stack with size of 8388608 bytes D0712 20:23:45.831743 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.833967 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.834013 30218 usertrap_amd64.go:106] [ 932: 932] Map a usertrap vma at 6a000 D0712 20:23:45.834104 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 1 D0712 20:23:45.834141 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:45.834497 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.834524 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 2 D0712 20:23:45.834536 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:45.834954 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.834971 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 3 D0712 20:23:45.834978 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:45.840604 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.840692 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 4 D0712 20:23:45.840710 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:45.842157 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.842189 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 5 D0712 20:23:45.842202 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:45.842241 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.842249 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 6 D0712 20:23:45.842257 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:45.842462 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.842485 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 7 D0712 20:23:45.842495 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:45.842630 30218 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.842646 30218 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc000d99a70 8 D0712 20:23:45.842656 30218 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:45.842807 30218 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.842823 30218 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc000d99a70 9 D0712 20:23:45.842832 30218 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:45.842963 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.842990 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 10 D0712 20:23:45.843000 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:45.851487 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.851534 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 11 D0712 20:23:45.851550 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:45.853999 30218 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.854043 30218 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc000d99a70 12 D0712 20:23:45.854058 30218 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:45.854137 30218 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.854147 30218 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc000d99a70 13 D0712 20:23:45.854155 30218 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:45.854285 30218 task_signals.go:470] [ 932: 932] Notified of signal 23 D0712 20:23:45.854474 30218 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0712 20:23:45.862379 30218 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.862423 30218 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc000d99a70 14 D0712 20:23:45.862436 30218 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:45.862501 30218 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.862534 30218 task_signals.go:204] [ 932: 934] Signal 932, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.862579 30218 task_signals.go:204] [ 932: 936] Signal 932, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.862599 30218 task_signals.go:204] [ 932: 935] Signal 932, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.862612 30218 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.862650 30218 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.862669 30218 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.862687 30218 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.862668 30218 task_signals.go:204] [ 932: 933] Signal 932, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.862705 30218 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.862713 30218 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.862735 30218 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.862745 30218 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.862753 30218 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.862767 30218 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.862775 30218 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.863886 30218 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.863921 30218 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.863935 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.863968 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.863990 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.864069 30218 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.864513 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.865793 30218 syscalls.go:262] [ 937: 937] Allocating stack with size of 8388608 bytes D0712 20:23:45.865892 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.867064 30218 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.867104 30218 usertrap_amd64.go:106] [ 937: 937] Map a usertrap vma at 67000 D0712 20:23:45.867189 30218 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000161500 1 D0712 20:23:45.867217 30218 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:45.867434 30218 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.867455 30218 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000161500 2 D0712 20:23:45.867465 30218 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:45.867802 30218 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.867822 30218 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000161500 3 D0712 20:23:45.867831 30218 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:45.872907 30218 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.872933 30218 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000161500 4 D0712 20:23:45.872981 30218 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:45.873996 30218 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.874023 30218 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000161500 5 D0712 20:23:45.874033 30218 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:45.874063 30218 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.874069 30218 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000161500 6 D0712 20:23:45.874076 30218 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:45.874246 30218 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.874265 30218 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000161500 7 D0712 20:23:45.874274 30218 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:45.874404 30218 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.874423 30218 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000161500 8 D0712 20:23:45.874432 30218 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:45.874541 30218 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.874551 30218 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000161500 9 D0712 20:23:45.874558 30218 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b6e0 trap addr 672d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:45.874594 30218 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.874608 30218 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000161500 10 D0712 20:23:45.874619 30218 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:45.874676 30218 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.874686 30218 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000161500 11 D0712 20:23:45.874694 30218 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46af76 trap addr 67370 ([184 35 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:45.881116 30218 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.881141 30218 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000161500 12 D0712 20:23:45.881150 30218 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:45.885164 30218 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.885264 30218 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000161500 13 D0712 20:23:45.885279 30218 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:45.885326 30218 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.885331 30218 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000161500 14 D0712 20:23:45.885335 30218 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:45.885348 30218 task_signals.go:470] [ 937: 937] Notified of signal 23 D0712 20:23:45.885511 30218 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler D0712 20:23:45.890655 30218 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.890682 30218 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000161500 15 D0712 20:23:45.890695 30218 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0712 20:23:45.890751 30218 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.890772 30218 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.890787 30218 task_signals.go:204] [ 937: 939] Signal 937, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.890808 30218 task_signals.go:204] [ 937: 941] Signal 937, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.890795 30218 task_signals.go:204] [ 937: 940] Signal 937, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.890822 30218 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.890839 30218 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.890854 30218 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.890868 30218 task_signals.go:204] [ 937: 942] Signal 937, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.890878 30218 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.890885 30218 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.890890 30218 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.890900 30218 task_signals.go:204] [ 937: 938] Signal 937, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.890909 30218 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.890919 30218 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.890926 30218 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.890935 30218 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.890951 30218 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.890964 30218 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.890973 30218 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.891884 30218 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.891899 30218 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.891916 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.891949 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.891965 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.892187 30218 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.892627 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.893739 30218 syscalls.go:262] [ 943: 943] Allocating stack with size of 8388608 bytes D0712 20:23:45.893847 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.894791 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.894826 30218 usertrap_amd64.go:106] [ 943: 943] Map a usertrap vma at 61000 D0712 20:23:45.894888 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 1 D0712 20:23:45.894912 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:45.895126 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.895140 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 2 D0712 20:23:45.895145 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:45.895601 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.895620 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 3 D0712 20:23:45.895626 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:45.900786 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.900819 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 4 D0712 20:23:45.900831 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:45.901908 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.901931 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 5 D0712 20:23:45.901939 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:45.901975 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.901990 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 6 D0712 20:23:45.901995 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:45.902128 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.902140 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 7 D0712 20:23:45.902145 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:45.902215 30218 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.902225 30218 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc00052dfb0 8 D0712 20:23:45.902233 30218 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:45.902408 30218 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.902437 30218 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc00052dfb0 9 D0712 20:23:45.902446 30218 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:45.902506 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.902523 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 10 D0712 20:23:45.902533 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:45.908664 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.908691 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 11 D0712 20:23:45.908700 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:45.914168 30218 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.914193 30218 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc00052dfb0 12 D0712 20:23:45.914201 30218 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:45.914248 30218 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.914265 30218 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc00052dfb0 13 D0712 20:23:45.914281 30218 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:45.914326 30218 task_signals.go:470] [ 943: 943] Notified of signal 23 D0712 20:23:45.914395 30218 task_signals.go:220] [ 943: 943] Signal 23: delivering to handler I0712 20:23:45.917638 30218 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0712 20:23:45.917707 30218 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.917716 30218 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc00052dfb0 14 D0712 20:23:45.917726 30218 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:45.917751 30218 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.917773 30218 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.917775 30218 task_signals.go:204] [ 943: 944] Signal 943, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.917799 30218 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.917820 30218 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.917834 30218 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.917849 30218 task_signals.go:204] [ 943: 946] Signal 943, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.917870 30218 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.917877 30218 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.917882 30218 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.917892 30218 task_signals.go:204] [ 943: 947] Signal 943, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.917900 30218 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.917911 30218 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.917916 30218 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.917930 30218 task_signals.go:204] [ 943: 945] Signal 943, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.917936 30218 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.918805 30218 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.918829 30218 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.918842 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.918872 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.918889 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.919002 30218 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.919111 30218 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:45.919226 30218 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:45.919482 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.920529 30218 syscalls.go:262] [ 948: 948] Allocating stack with size of 8388608 bytes D0712 20:23:45.920615 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.921193 30218 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.921230 30218 usertrap_amd64.go:106] [ 948: 948] Map a usertrap vma at 69000 D0712 20:23:45.921571 30218 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0004ec7e0 1 D0712 20:23:45.921602 30218 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:45.922197 30218 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.922219 30218 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0004ec7e0 2 D0712 20:23:45.922227 30218 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:45.922662 30218 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.922684 30218 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0004ec7e0 3 D0712 20:23:45.922696 30218 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:45.931570 30218 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.931622 30218 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0004ec7e0 4 D0712 20:23:45.931638 30218 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:45.932691 30218 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.932718 30218 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0004ec7e0 5 D0712 20:23:45.932727 30218 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:45.933075 30218 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.933100 30218 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0004ec7e0 6 D0712 20:23:45.933111 30218 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:45.933377 30218 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.933401 30218 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0004ec7e0 7 D0712 20:23:45.933411 30218 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:45.933557 30218 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.933582 30218 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0004ec7e0 8 D0712 20:23:45.933592 30218 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:45.933702 30218 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:45.933722 30218 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0004ec7e0 9 D0712 20:23:45.933734 30218 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b6e0 trap addr 692d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:45.933761 30218 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.933805 30218 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0004ec7e0 10 D0712 20:23:45.933814 30218 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:45.933867 30218 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.933884 30218 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0004ec7e0 11 D0712 20:23:45.933892 30218 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46af76 trap addr 69370 ([184 35 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:45.940691 30218 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.940723 30218 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0004ec7e0 12 D0712 20:23:45.940736 30218 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:45.944262 30218 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.944283 30218 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0004ec7e0 13 D0712 20:23:45.944295 30218 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:45.944311 30218 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.944319 30218 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc0004ec7e0 14 D0712 20:23:45.944326 30218 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:45.944349 30218 task_signals.go:470] [ 948: 948] Notified of signal 23 D0712 20:23:45.944381 30218 task_signals.go:220] [ 948: 948] Signal 23: delivering to handler D0712 20:23:45.949897 30218 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.949931 30218 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc0004ec7e0 15 D0712 20:23:45.949948 30218 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0712 20:23:45.950000 30218 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.950033 30218 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.950057 30218 task_signals.go:204] [ 948: 949] Signal 948, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.950081 30218 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.950089 30218 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.950095 30218 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.950109 30218 task_signals.go:204] [ 948: 950] Signal 948, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.950126 30218 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.950135 30218 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.950140 30218 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.950153 30218 task_signals.go:204] [ 948: 951] Signal 948, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.950170 30218 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.950177 30218 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.950182 30218 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.950196 30218 task_signals.go:204] [ 948: 952] Signal 948, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.950211 30218 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.951162 30218 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.951192 30218 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.951200 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.951223 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.951233 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.951339 30218 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.957255 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.958242 30218 syscalls.go:262] [ 953: 953] Allocating stack with size of 8388608 bytes D0712 20:23:45.958329 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.959062 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.959098 30218 usertrap_amd64.go:106] [ 953: 953] Map a usertrap vma at 61000 D0712 20:23:45.959176 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 1 D0712 20:23:45.959208 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:45.959663 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.959729 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 2 D0712 20:23:45.959747 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:45.960237 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.960258 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 3 D0712 20:23:45.960267 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:45.966382 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:45.966425 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 4 D0712 20:23:45.966437 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:45.967684 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:45.967711 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 5 D0712 20:23:45.967725 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:45.967765 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b214:sysno 13 D0712 20:23:45.967779 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 6 D0712 20:23:45.967788 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:45.967955 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:45.967974 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 7 D0712 20:23:45.967984 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:45.968244 30218 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:45.968266 30218 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0015a2930 8 D0712 20:23:45.968275 30218 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:45.968422 30218 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46af76:sysno 35 D0712 20:23:45.968438 30218 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0015a2930 9 D0712 20:23:45.968448 30218 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:45.968677 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:45.968771 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 10 D0712 20:23:45.968786 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:45.977029 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46af29:sysno 293 D0712 20:23:45.977069 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 11 D0712 20:23:45.977084 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:45.979691 30218 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b020:sysno 39 D0712 20:23:45.979725 30218 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0015a2930 12 D0712 20:23:45.979741 30218 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:45.979803 30218 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:45.979854 30218 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc0015a2930 13 D0712 20:23:45.979869 30218 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:45.979910 30218 task_signals.go:470] [ 953: 953] Notified of signal 23 D0712 20:23:45.980020 30218 task_signals.go:220] [ 953: 953] Signal 23: delivering to handler I0712 20:23:45.987220 30218 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0712 20:23:45.987431 30218 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:45.987461 30218 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc0015a2930 14 D0712 20:23:45.987475 30218 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:45.987566 30218 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.987604 30218 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.987620 30218 task_signals.go:204] [ 953: 955] Signal 953, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.987647 30218 task_signals.go:204] [ 953: 957] Signal 953, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.987655 30218 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.987679 30218 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.987686 30218 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.987632 30218 task_signals.go:204] [ 953: 956] Signal 953, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.987697 30218 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.987735 30218 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.987745 30218 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.987759 30218 task_signals.go:204] [ 953: 954] Signal 953, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:45.987773 30218 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.987781 30218 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.987786 30218 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.987796 30218 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:45.989123 30218 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:45.989192 30218 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.989207 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:45.989257 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:45.989275 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:45.989510 30218 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:45.990053 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.991410 30218 syscalls.go:262] [ 958: 958] Allocating stack with size of 8388608 bytes D0712 20:23:45.991606 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:45.993009 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:45.993046 30218 usertrap_amd64.go:106] [ 958: 958] Map a usertrap vma at 61000 D0712 20:23:45.993210 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 1 D0712 20:23:45.993245 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:45.993621 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:45.993652 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 2 D0712 20:23:45.993662 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:45.994236 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:45.994274 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 3 D0712 20:23:45.994291 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:46.001089 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.001120 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 4 D0712 20:23:46.001138 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:46.002453 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.002486 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 5 D0712 20:23:46.002499 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:46.002543 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.002547 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 6 D0712 20:23:46.002554 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:46.002741 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.002761 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 7 D0712 20:23:46.002767 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:46.002894 30218 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.002919 30218 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc000161980 8 D0712 20:23:46.002927 30218 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:46.003162 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.003189 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 9 D0712 20:23:46.003202 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:46.003314 30218 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.003360 30218 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc000161980 10 D0712 20:23:46.003409 30218 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:46.011122 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.011158 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 11 D0712 20:23:46.011173 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:46.013650 30218 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.013689 30218 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc000161980 12 D0712 20:23:46.013703 30218 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:46.013726 30218 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.013742 30218 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc000161980 13 D0712 20:23:46.013754 30218 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:46.013806 30218 task_signals.go:470] [ 958: 958] Notified of signal 23 D0712 20:23:46.013900 30218 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler I0712 20:23:46.021455 30218 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0712 20:23:46.021555 30218 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.021568 30218 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc000161980 14 D0712 20:23:46.021582 30218 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:46.021636 30218 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.021662 30218 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.021683 30218 task_signals.go:204] [ 958: 962] Signal 958, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.021681 30218 task_signals.go:204] [ 958: 961] Signal 958, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.021699 30218 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.021708 30218 task_signals.go:204] [ 958: 959] Signal 958, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.021713 30218 task_signals.go:204] [ 958: 960] Signal 958, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.021729 30218 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.021738 30218 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.021756 30218 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.021766 30218 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.021776 30218 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.021785 30218 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.021793 30218 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.021799 30218 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.021813 30218 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.023057 30218 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.023096 30218 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.023119 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.023151 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.023164 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.023282 30218 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.023912 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.025296 30218 syscalls.go:262] [ 963: 963] Allocating stack with size of 8388608 bytes D0712 20:23:46.025487 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.026234 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.026272 30218 usertrap_amd64.go:106] [ 963: 963] Map a usertrap vma at 63000 D0712 20:23:46.026359 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 1 D0712 20:23:46.026391 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:46.026766 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.026793 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 2 D0712 20:23:46.026804 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:46.027224 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.027251 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 3 D0712 20:23:46.027264 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:46.032064 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.032094 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 4 D0712 20:23:46.032106 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:46.033156 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.033185 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 5 D0712 20:23:46.033196 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:46.033307 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.033333 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 6 D0712 20:23:46.033343 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:46.033779 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.033813 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 7 D0712 20:23:46.033824 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:46.033988 30218 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.034009 30218 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc000161b90 8 D0712 20:23:46.034018 30218 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:46.034267 30218 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.034292 30218 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc000161b90 9 D0712 20:23:46.034341 30218 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:46.034365 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.034381 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 10 D0712 20:23:46.034389 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:46.042679 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.042703 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 11 D0712 20:23:46.042712 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:46.044880 30218 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.044923 30218 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc000161b90 12 D0712 20:23:46.044974 30218 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:46.045077 30218 usertrap_amd64.go:212] [ 963: 964] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.045101 30218 usertrap_amd64.go:122] [ 963: 964] Allocate a new trap: 0xc000161b90 13 D0712 20:23:46.045110 30218 usertrap_amd64.go:225] [ 963: 964] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:46.046593 30218 task_signals.go:470] [ 963: 963] Notified of signal 23 D0712 20:23:46.046638 30218 task_signals.go:220] [ 963: 963] Signal 23: delivering to handler I0712 20:23:46.052345 30218 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0712 20:23:46.052447 30218 usertrap_amd64.go:212] [ 963: 963] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.052460 30218 usertrap_amd64.go:122] [ 963: 963] Allocate a new trap: 0xc000161b90 14 D0712 20:23:46.052470 30218 usertrap_amd64.go:225] [ 963: 963] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:46.052503 30218 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.052534 30218 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.052549 30218 task_signals.go:204] [ 963: 965] Signal 963, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.052554 30218 task_signals.go:204] [ 963: 966] Signal 963, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.052572 30218 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.052575 30218 task_signals.go:204] [ 963: 967] Signal 963, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.052606 30218 task_signals.go:204] [ 963: 964] Signal 963, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.052626 30218 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.052635 30218 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.052642 30218 task_exit.go:204] [ 963: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.052654 30218 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.052673 30218 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.052677 30218 task_exit.go:204] [ 963: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.052690 30218 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.052824 30218 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.052851 30218 task_exit.go:204] [ 963: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.053801 30218 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.053840 30218 task_exit.go:204] [ 963: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.053855 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.053919 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.053948 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.054150 30218 task_exit.go:204] [ 963: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.054886 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.056278 30218 syscalls.go:262] [ 968: 968] Allocating stack with size of 8388608 bytes D0712 20:23:46.056381 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.058736 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.058775 30218 usertrap_amd64.go:106] [ 968: 968] Map a usertrap vma at 65000 D0712 20:23:46.058871 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 1 D0712 20:23:46.058907 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:46.059548 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.059575 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 2 D0712 20:23:46.059586 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:46.059988 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.060012 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 3 D0712 20:23:46.060022 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:46.066293 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.066324 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 4 D0712 20:23:46.066336 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:46.067724 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.067747 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 5 D0712 20:23:46.067755 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:46.067781 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.067804 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 6 D0712 20:23:46.067810 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:46.068026 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.068047 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 7 D0712 20:23:46.068056 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:46.068194 30218 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.068225 30218 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc0015a30b0 8 D0712 20:23:46.068237 30218 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:46.068477 30218 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.068487 30218 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc0015a30b0 9 D0712 20:23:46.068493 30218 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:46.068526 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.068536 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 10 D0712 20:23:46.068545 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:46.076906 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.076967 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 11 D0712 20:23:46.076981 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:46.079912 30218 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.079968 30218 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc0015a30b0 12 D0712 20:23:46.079993 30218 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:46.080147 30218 usertrap_amd64.go:212] [ 968: 969] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.080181 30218 usertrap_amd64.go:122] [ 968: 969] Allocate a new trap: 0xc0015a30b0 13 D0712 20:23:46.080196 30218 usertrap_amd64.go:225] [ 968: 969] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:46.080254 30218 task_signals.go:470] [ 968: 968] Notified of signal 23 D0712 20:23:46.080325 30218 task_signals.go:220] [ 968: 968] Signal 23: delivering to handler I0712 20:23:46.088610 30218 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0712 20:23:46.088702 30218 usertrap_amd64.go:212] [ 968: 968] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.088715 30218 usertrap_amd64.go:122] [ 968: 968] Allocate a new trap: 0xc0015a30b0 14 D0712 20:23:46.088726 30218 usertrap_amd64.go:225] [ 968: 968] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:46.088764 30218 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.088802 30218 task_signals.go:204] [ 968: 969] Signal 968, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.088816 30218 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.088840 30218 task_signals.go:204] [ 968: 970] Signal 968, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.088838 30218 task_signals.go:204] [ 968: 971] Signal 968, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.088858 30218 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.088868 30218 task_signals.go:204] [ 968: 972] Signal 968, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.088874 30218 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.088885 30218 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.088896 30218 task_exit.go:204] [ 968: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.088936 30218 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.089002 30218 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.089010 30218 task_exit.go:204] [ 968: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.089023 30218 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.089099 30218 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.089127 30218 task_exit.go:204] [ 968: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.090341 30218 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.090372 30218 task_exit.go:204] [ 968: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.090386 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.090441 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.090464 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.090599 30218 task_exit.go:204] [ 968: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.091362 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.092859 30218 syscalls.go:262] [ 973: 973] Allocating stack with size of 8388608 bytes D0712 20:23:46.093043 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.094294 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.094336 30218 usertrap_amd64.go:106] [ 973: 973] Map a usertrap vma at 60000 D0712 20:23:46.094413 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 1 D0712 20:23:46.094433 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:46.094702 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.094721 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 2 D0712 20:23:46.094729 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:46.095494 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.095521 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 3 D0712 20:23:46.095531 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:46.101082 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.101107 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 4 D0712 20:23:46.101123 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:46.104600 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.104620 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 5 D0712 20:23:46.104633 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:46.104677 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.104693 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 6 D0712 20:23:46.104700 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:46.104876 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.104891 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 7 D0712 20:23:46.104899 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:46.105713 30218 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.105747 30218 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc000db3980 8 D0712 20:23:46.105761 30218 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:46.105968 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.105995 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 9 D0712 20:23:46.106006 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:46.106045 30218 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.106057 30218 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc000db3980 10 D0712 20:23:46.106066 30218 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:46.106106 30218 usertrap_amd64.go:212] [ 973: 976] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:46.106120 30218 usertrap_amd64.go:122] [ 973: 976] Allocate a new trap: 0xc000db3980 11 D0712 20:23:46.106130 30218 usertrap_amd64.go:225] [ 973: 976] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:46.116468 30218 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.116493 30218 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc000db3980 12 D0712 20:23:46.116503 30218 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:46.116570 30218 usertrap_amd64.go:212] [ 973: 974] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.116578 30218 usertrap_amd64.go:122] [ 973: 974] Allocate a new trap: 0xc000db3980 13 D0712 20:23:46.116585 30218 usertrap_amd64.go:225] [ 973: 974] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:46.116632 30218 task_signals.go:470] [ 973: 973] Notified of signal 23 D0712 20:23:46.116651 30218 task_signals.go:220] [ 973: 973] Signal 23: delivering to handler D0712 20:23:46.116708 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.116729 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 14 D0712 20:23:46.116737 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46af29 trap addr 60460 ([184 37 1 0 0 15 5] -> [255 36 37 96 4 6 0]) I0712 20:23:46.126835 30218 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0712 20:23:46.126904 30218 usertrap_amd64.go:212] [ 973: 973] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.126926 30218 usertrap_amd64.go:122] [ 973: 973] Allocate a new trap: 0xc000db3980 15 D0712 20:23:46.126941 30218 usertrap_amd64.go:225] [ 973: 973] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0712 20:23:46.126945 30218 task_signals.go:470] [ 973: 973] Notified of signal 23 D0712 20:23:46.127023 30218 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.127076 30218 task_signals.go:204] [ 973: 978] Signal 973, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.127078 30218 task_signals.go:204] [ 973: 975] Signal 973, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.127103 30218 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.127118 30218 task_signals.go:204] [ 973: 974] Signal 973, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.127128 30218 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.127150 30218 task_signals.go:204] [ 973: 977] Signal 973, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.127171 30218 task_signals.go:204] [ 973: 976] Signal 973, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.127183 30218 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.127189 30218 task_exit.go:204] [ 973: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.127201 30218 task_exit.go:204] [ 973: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.127209 30218 task_exit.go:204] [ 973: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.127215 30218 task_exit.go:204] [ 973: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.127228 30218 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.127244 30218 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.127263 30218 task_exit.go:204] [ 973: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.127272 30218 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.127280 30218 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.127285 30218 task_exit.go:204] [ 973: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.127296 30218 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.128474 30218 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.128511 30218 task_exit.go:204] [ 973: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.128521 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.128539 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.128550 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.128654 30218 task_exit.go:204] [ 973: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.129209 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.130534 30218 syscalls.go:262] [ 979: 979] Allocating stack with size of 8388608 bytes D0712 20:23:46.130725 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.131999 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.132040 30218 usertrap_amd64.go:106] [ 979: 979] Map a usertrap vma at 69000 D0712 20:23:46.132132 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 1 D0712 20:23:46.132160 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:46.132482 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.132506 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 2 D0712 20:23:46.132516 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:46.133225 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.133254 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 3 D0712 20:23:46.133270 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:46.139385 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.139408 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 4 D0712 20:23:46.139417 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:46.140651 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.140697 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 5 D0712 20:23:46.140714 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:46.140773 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.140793 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 6 D0712 20:23:46.140803 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:46.141426 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.141444 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 7 D0712 20:23:46.141457 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:46.141601 30218 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.141685 30218 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc001a803f0 8 D0712 20:23:46.141755 30218 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:46.141842 30218 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.141866 30218 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc001a803f0 9 D0712 20:23:46.141879 30218 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:46.142052 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.142077 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 10 D0712 20:23:46.142088 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:46.148692 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.148723 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 11 D0712 20:23:46.148734 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:46.152295 30218 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.152333 30218 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc001a803f0 12 D0712 20:23:46.152344 30218 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:46.152402 30218 usertrap_amd64.go:212] [ 979: 980] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.152429 30218 usertrap_amd64.go:122] [ 979: 980] Allocate a new trap: 0xc001a803f0 13 D0712 20:23:46.152442 30218 usertrap_amd64.go:225] [ 979: 980] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:46.152479 30218 task_signals.go:470] [ 979: 979] Notified of signal 23 D0712 20:23:46.152543 30218 task_signals.go:220] [ 979: 979] Signal 23: delivering to handler I0712 20:23:46.158410 30218 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0712 20:23:46.158504 30218 usertrap_amd64.go:212] [ 979: 979] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.158513 30218 usertrap_amd64.go:122] [ 979: 979] Allocate a new trap: 0xc001a803f0 14 D0712 20:23:46.158519 30218 usertrap_amd64.go:225] [ 979: 979] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:46.158546 30218 task_exit.go:204] [ 979: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.158562 30218 task_exit.go:204] [ 979: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.158585 30218 task_signals.go:204] [ 979: 982] Signal 979, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.158606 30218 task_exit.go:204] [ 979: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.158616 30218 task_exit.go:204] [ 979: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.158622 30218 task_exit.go:204] [ 979: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.158612 30218 task_signals.go:204] [ 979: 981] Signal 979, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.158641 30218 task_signals.go:204] [ 979: 983] Signal 979, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.158641 30218 task_signals.go:204] [ 979: 980] Signal 979, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.158653 30218 task_exit.go:204] [ 979: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.158669 30218 task_exit.go:204] [ 979: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.158678 30218 task_exit.go:204] [ 979: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.158690 30218 task_exit.go:204] [ 979: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.158698 30218 task_exit.go:204] [ 979: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.158704 30218 task_exit.go:204] [ 979: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.158722 30218 task_exit.go:204] [ 979: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.159705 30218 task_exit.go:204] [ 979: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.159728 30218 task_exit.go:204] [ 979: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.159737 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.159776 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.159820 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.159862 30218 task_exit.go:204] [ 979: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.160377 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.161626 30218 syscalls.go:262] [ 984: 984] Allocating stack with size of 8388608 bytes D0712 20:23:46.161736 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.164780 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.164830 30218 usertrap_amd64.go:106] [ 984: 984] Map a usertrap vma at 6a000 D0712 20:23:46.164934 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 1 D0712 20:23:46.165047 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:46.165392 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.165418 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 2 D0712 20:23:46.165428 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:46.166065 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.166089 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 3 D0712 20:23:46.166099 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:46.171993 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.172024 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 4 D0712 20:23:46.172036 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:46.173310 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.173344 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 5 D0712 20:23:46.173356 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:46.173403 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.173409 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 6 D0712 20:23:46.173420 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:46.173642 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.173665 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 7 D0712 20:23:46.173673 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:46.173812 30218 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.173833 30218 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc000db3d10 8 D0712 20:23:46.173842 30218 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:46.173914 30218 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.173923 30218 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc000db3d10 9 D0712 20:23:46.173931 30218 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:46.174117 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.174145 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 10 D0712 20:23:46.174160 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:46.181039 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.181067 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 11 D0712 20:23:46.181078 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:46.184868 30218 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.184901 30218 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc000db3d10 12 D0712 20:23:46.184913 30218 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:46.184930 30218 usertrap_amd64.go:212] [ 984: 985] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.185004 30218 usertrap_amd64.go:122] [ 984: 985] Allocate a new trap: 0xc000db3d10 13 D0712 20:23:46.185013 30218 usertrap_amd64.go:225] [ 984: 985] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:46.185057 30218 task_signals.go:470] [ 984: 984] Notified of signal 23 D0712 20:23:46.185148 30218 task_signals.go:220] [ 984: 984] Signal 23: delivering to handler D0712 20:23:46.191749 30218 usertrap_amd64.go:212] [ 984: 984] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.191774 30218 usertrap_amd64.go:122] [ 984: 984] Allocate a new trap: 0xc000db3d10 14 D0712 20:23:46.191786 30218 usertrap_amd64.go:225] [ 984: 984] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:46.191835 30218 task_exit.go:204] [ 984: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.191869 30218 task_exit.go:204] [ 984: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.191871 30218 task_signals.go:204] [ 984: 988] Signal 984, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.191909 30218 task_exit.go:204] [ 984: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.191928 30218 task_exit.go:204] [ 984: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.191941 30218 task_exit.go:204] [ 984: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.191958 30218 task_signals.go:204] [ 984: 986] Signal 984, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.191977 30218 task_exit.go:204] [ 984: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.191985 30218 task_exit.go:204] [ 984: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.191998 30218 task_exit.go:204] [ 984: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.192012 30218 task_signals.go:204] [ 984: 985] Signal 984, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.192029 30218 task_exit.go:204] [ 984: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.192036 30218 task_exit.go:204] [ 984: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.192042 30218 task_exit.go:204] [ 984: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.192053 30218 task_signals.go:204] [ 984: 987] Signal 984, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.192061 30218 task_exit.go:204] [ 984: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.193254 30218 task_exit.go:204] [ 984: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.193290 30218 task_exit.go:204] [ 984: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.193303 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.193330 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.193339 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.193538 30218 task_exit.go:204] [ 984: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.194071 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.195537 30218 syscalls.go:262] [ 989: 989] Allocating stack with size of 8388608 bytes D0712 20:23:46.195664 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.196965 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.197000 30218 usertrap_amd64.go:106] [ 989: 989] Map a usertrap vma at 61000 D0712 20:23:46.197071 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 1 D0712 20:23:46.197090 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:46.197309 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.197332 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 2 D0712 20:23:46.197342 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:46.197908 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.197931 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 3 D0712 20:23:46.197945 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:46.203261 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.203290 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 4 D0712 20:23:46.203303 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:46.204328 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.204352 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 5 D0712 20:23:46.204362 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:46.204407 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.204429 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 6 D0712 20:23:46.204434 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:46.204636 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.204650 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 7 D0712 20:23:46.204655 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:46.204785 30218 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.204805 30218 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc001a80960 8 D0712 20:23:46.204811 30218 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:46.204929 30218 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.204966 30218 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc001a80960 9 D0712 20:23:46.204998 30218 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:46.205109 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.205119 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 10 D0712 20:23:46.205128 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:46.211471 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.211499 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 11 D0712 20:23:46.211509 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:46.215504 30218 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.215531 30218 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc001a80960 12 D0712 20:23:46.215545 30218 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:46.215600 30218 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.215628 30218 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc001a80960 13 D0712 20:23:46.215639 30218 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:46.215713 30218 task_signals.go:470] [ 989: 989] Notified of signal 23 D0712 20:23:46.215842 30218 task_signals.go:220] [ 989: 989] Signal 23: delivering to handler D0712 20:23:46.221327 30218 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.221494 30218 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001a80960 14 D0712 20:23:46.221646 30218 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:46.221778 30218 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.222241 30218 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.222353 30218 task_signals.go:204] [ 989: 991] Signal 989, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.222372 30218 task_signals.go:204] [ 989: 990] Signal 989, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.222398 30218 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.222414 30218 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.222420 30218 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.222374 30218 task_signals.go:204] [ 989: 992] Signal 989, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.222379 30218 task_signals.go:204] [ 989: 993] Signal 989, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.222458 30218 task_signals.go:204] [ 989: 994] Signal 989, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.222473 30218 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.222595 30218 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.222617 30218 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.222632 30218 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.222639 30218 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.222678 30218 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.222694 30218 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.222705 30218 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.222710 30218 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.222721 30218 task_exit.go:204] [ 989: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.223929 30218 task_exit.go:204] [ 989: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.223961 30218 task_exit.go:204] [ 989: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.224012 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.224168 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.224203 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.224320 30218 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.225619 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.226988 30218 syscalls.go:262] [ 995: 995] Allocating stack with size of 8388608 bytes D0712 20:23:46.227130 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.229885 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.229947 30218 usertrap_amd64.go:106] [ 995: 995] Map a usertrap vma at 63000 D0712 20:23:46.230041 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 1 D0712 20:23:46.230077 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:46.230717 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.230742 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 2 D0712 20:23:46.230753 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:46.231353 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.231407 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 3 D0712 20:23:46.231451 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:46.237108 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.237134 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 4 D0712 20:23:46.237145 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:46.238045 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.238069 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 5 D0712 20:23:46.238079 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:46.238120 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.238137 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 6 D0712 20:23:46.238156 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:46.238461 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.238474 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 7 D0712 20:23:46.238483 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:46.238629 30218 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.238639 30218 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc001a28e10 8 D0712 20:23:46.238647 30218 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:46.238827 30218 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.238840 30218 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc001a28e10 9 D0712 20:23:46.238849 30218 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:46.238915 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.238938 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 10 D0712 20:23:46.238950 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:46.245687 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.245719 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 11 D0712 20:23:46.245730 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:46.249806 30218 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.249836 30218 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc001a28e10 12 D0712 20:23:46.249848 30218 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:46.250056 30218 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.250079 30218 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc001a28e10 13 D0712 20:23:46.250115 30218 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:46.251852 30218 task_signals.go:470] [ 995: 995] Notified of signal 23 D0712 20:23:46.251956 30218 task_signals.go:220] [ 995: 995] Signal 23: delivering to handler D0712 20:23:46.255707 30218 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.255734 30218 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc001a28e10 14 D0712 20:23:46.255744 30218 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:46.255777 30218 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.255802 30218 task_signals.go:204] [ 995: 997] Signal 995, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.255810 30218 task_signals.go:204] [ 995: 998] Signal 995, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.255820 30218 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.255853 30218 task_signals.go:204] [ 995: 999] Signal 995, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.255874 30218 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.255884 30218 task_signals.go:204] [ 995: 996] Signal 995, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.255898 30218 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.255917 30218 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.255932 30218 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.255941 30218 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.255955 30218 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.255964 30218 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.255982 30218 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.255988 30218 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.255999 30218 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.256880 30218 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.256908 30218 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.256930 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.256972 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.256987 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.257030 30218 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitZombie to TaskExitDead I0712 20:23:46.257213 30218 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0712 20:23:46.258231 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.259419 30218 syscalls.go:262] [ 1000: 1000] Allocating stack with size of 8388608 bytes D0712 20:23:46.259555 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.260524 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.260567 30218 usertrap_amd64.go:106] [ 1000: 1000] Map a usertrap vma at 62000 D0712 20:23:46.260625 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 1 D0712 20:23:46.260648 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:46.261287 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.261346 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 2 D0712 20:23:46.261367 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:46.262140 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.262169 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 3 D0712 20:23:46.262180 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:46.267841 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.267892 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 4 D0712 20:23:46.267911 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:46.269273 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.269305 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 5 D0712 20:23:46.269319 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:46.269517 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.269544 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 6 D0712 20:23:46.269552 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:46.269916 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.269947 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 7 D0712 20:23:46.269960 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:46.270148 30218 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.270174 30218 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0005be2d0 8 D0712 20:23:46.270187 30218 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:46.270426 30218 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.270465 30218 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0005be2d0 9 D0712 20:23:46.270477 30218 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:46.270496 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.270510 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 10 D0712 20:23:46.270522 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:46.277266 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.277301 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 11 D0712 20:23:46.277315 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:46.281240 30218 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.281361 30218 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0005be2d0 12 D0712 20:23:46.281393 30218 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:46.281613 30218 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.281727 30218 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc0005be2d0 13 D0712 20:23:46.281779 30218 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:46.281922 30218 task_signals.go:470] [ 1000: 1000] Notified of signal 23 D0712 20:23:46.282041 30218 task_signals.go:220] [ 1000: 1000] Signal 23: delivering to handler I0712 20:23:46.288292 30218 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0712 20:23:46.288359 30218 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.288372 30218 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc0005be2d0 14 D0712 20:23:46.288385 30218 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:46.288433 30218 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.288468 30218 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.288494 30218 task_signals.go:204] [ 1000: 1001] Signal 1000, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.288517 30218 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.288526 30218 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.288532 30218 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.288550 30218 task_signals.go:204] [ 1000: 1002] Signal 1000, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.288561 30218 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.288569 30218 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.288574 30218 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.288623 30218 task_signals.go:204] [ 1000: 1003] Signal 1000, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.288643 30218 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.288652 30218 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.288658 30218 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.288678 30218 task_signals.go:204] [ 1000: 1004] Signal 1000, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.288703 30218 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.289860 30218 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.290016 30218 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.290125 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.290192 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.290235 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.290305 30218 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.290771 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.292028 30218 syscalls.go:262] [ 1005: 1005] Allocating stack with size of 8388608 bytes D0712 20:23:46.292177 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.294467 30218 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.294514 30218 usertrap_amd64.go:106] [ 1005: 1005] Map a usertrap vma at 66000 D0712 20:23:46.294582 30218 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc001a80b40 1 D0712 20:23:46.294621 30218 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:46.294976 30218 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.294995 30218 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc001a80b40 2 D0712 20:23:46.295002 30218 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:46.295545 30218 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.295573 30218 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc001a80b40 3 D0712 20:23:46.295587 30218 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:46.300919 30218 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.300976 30218 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc001a80b40 4 D0712 20:23:46.300990 30218 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:46.302029 30218 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.302054 30218 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc001a80b40 5 D0712 20:23:46.302075 30218 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:46.302138 30218 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.302155 30218 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc001a80b40 6 D0712 20:23:46.302164 30218 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:46.302688 30218 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.302708 30218 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc001a80b40 7 D0712 20:23:46.302721 30218 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:46.302931 30218 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.302958 30218 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc001a80b40 8 D0712 20:23:46.302969 30218 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:46.303135 30218 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:46.303149 30218 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc001a80b40 9 D0712 20:23:46.303159 30218 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b6e0 trap addr 662d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:46.303175 30218 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.303182 30218 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc001a80b40 10 D0712 20:23:46.303190 30218 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:46.303343 30218 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.303357 30218 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc001a80b40 11 D0712 20:23:46.303368 30218 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46af76 trap addr 66370 ([184 35 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:46.310197 30218 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.310284 30218 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc001a80b40 12 D0712 20:23:46.310316 30218 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:46.315053 30218 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.315114 30218 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc001a80b40 13 D0712 20:23:46.315133 30218 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:46.315179 30218 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.315186 30218 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc001a80b40 14 D0712 20:23:46.315200 30218 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:46.315222 30218 task_signals.go:470] [ 1005: 1005] Notified of signal 23 D0712 20:23:46.315362 30218 task_signals.go:220] [ 1005: 1005] Signal 23: delivering to handler I0712 20:23:46.323087 30218 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0712 20:23:46.323282 30218 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.323344 30218 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc001a80b40 15 D0712 20:23:46.323434 30218 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 20:23:46.323556 30218 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.323652 30218 task_signals.go:204] [ 1005: 1008] Signal 1005, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.323652 30218 task_signals.go:204] [ 1005: 1007] Signal 1005, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.323687 30218 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.323881 30218 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.323914 30218 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.323922 30218 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.323881 30218 task_signals.go:204] [ 1005: 1009] Signal 1005, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.323941 30218 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.323948 30218 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.323953 30218 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.323964 30218 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.323973 30218 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.323979 30218 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.324070 30218 task_signals.go:204] [ 1005: 1006] Signal 1005, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.324095 30218 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.325488 30218 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.325611 30218 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.325647 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.326148 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.326180 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.326471 30218 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.327160 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.328644 30218 syscalls.go:262] [ 1010: 1010] Allocating stack with size of 8388608 bytes D0712 20:23:46.328824 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.331359 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.331404 30218 usertrap_amd64.go:106] [ 1010: 1010] Map a usertrap vma at 60000 D0712 20:23:46.331516 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 1 D0712 20:23:46.331565 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:46.334309 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.334342 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 2 D0712 20:23:46.334361 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:46.335084 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.335136 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 3 D0712 20:23:46.335147 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:46.341349 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.341394 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 4 D0712 20:23:46.341410 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:46.342612 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.342637 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 5 D0712 20:23:46.342649 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:46.342722 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.342727 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 6 D0712 20:23:46.342731 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:46.343169 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.343192 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 7 D0712 20:23:46.343202 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:46.343457 30218 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.343511 30218 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0015a3bc0 8 D0712 20:23:46.343530 30218 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:46.343835 30218 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.343859 30218 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0015a3bc0 9 D0712 20:23:46.343869 30218 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:46.343927 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.343941 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 10 D0712 20:23:46.343950 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:46.344577 30218 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.344651 30218 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0015a3bc0 11 D0712 20:23:46.344699 30218 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:46.344801 30218 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.344825 30218 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc0015a3bc0 12 D0712 20:23:46.344835 30218 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:46.344885 30218 task_signals.go:470] [ 1010: 1010] Notified of signal 23 D0712 20:23:46.344925 30218 task_signals.go:220] [ 1010: 1010] Signal 23: delivering to handler D0712 20:23:46.352261 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.352319 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 13 D0712 20:23:46.352337 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:46.356161 30218 task_signals.go:470] [ 1010: 1010] Notified of signal 23 D0712 20:23:46.356370 30218 task_signals.go:220] [ 1010: 1010] Signal 23: delivering to handler D0712 20:23:46.363482 30218 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.363532 30218 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc0015a3bc0 14 D0712 20:23:46.363551 30218 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:46.363613 30218 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.363648 30218 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.363654 30218 task_signals.go:204] [ 1010: 1013] Signal 1010, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.363686 30218 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.363709 30218 task_signals.go:204] [ 1010: 1014] Signal 1010, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.363723 30218 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.363730 30218 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.363765 30218 task_signals.go:204] [ 1010: 1012] Signal 1010, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.363791 30218 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.363800 30218 task_signals.go:204] [ 1010: 1011] Signal 1010, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.363810 30218 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.363816 30218 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.363837 30218 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.363862 30218 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.363868 30218 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.363879 30218 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.365232 30218 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.365278 30218 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.365295 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.365366 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.365390 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.365540 30218 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.366207 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.367676 30218 syscalls.go:262] [ 1015: 1015] Allocating stack with size of 8388608 bytes D0712 20:23:46.367817 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.368911 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.369007 30218 usertrap_amd64.go:106] [ 1015: 1015] Map a usertrap vma at 69000 D0712 20:23:46.369087 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 1 D0712 20:23:46.369123 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:46.370150 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.370186 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 2 D0712 20:23:46.370200 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:46.371010 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.371036 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 3 D0712 20:23:46.371053 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:46.377846 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.377894 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 4 D0712 20:23:46.377910 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:46.379034 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.379072 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 5 D0712 20:23:46.379088 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:46.379167 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.379188 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 6 D0712 20:23:46.379198 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:46.379787 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.379817 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 7 D0712 20:23:46.379829 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:46.380032 30218 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.380061 30218 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc0015a3e90 8 D0712 20:23:46.380075 30218 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:46.380208 30218 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.380303 30218 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc0015a3e90 9 D0712 20:23:46.380338 30218 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:46.380355 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.380365 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 10 D0712 20:23:46.380373 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:46.387787 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.387817 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 11 D0712 20:23:46.387827 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:46.390746 30218 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.390776 30218 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc0015a3e90 12 D0712 20:23:46.390789 30218 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:46.390860 30218 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.390899 30218 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc0015a3e90 13 D0712 20:23:46.390908 30218 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:46.392064 30218 task_signals.go:470] [ 1015: 1015] Notified of signal 23 D0712 20:23:46.392141 30218 task_signals.go:220] [ 1015: 1015] Signal 23: delivering to handler D0712 20:23:46.397693 30218 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.397734 30218 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc0015a3e90 14 D0712 20:23:46.397749 30218 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:46.397792 30218 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.397826 30218 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.397874 30218 task_signals.go:204] [ 1015: 1018] Signal 1015, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.397895 30218 task_signals.go:204] [ 1015: 1017] Signal 1015, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.397911 30218 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.397923 30218 task_signals.go:204] [ 1015: 1019] Signal 1015, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.397944 30218 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.397950 30218 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.397948 30218 task_signals.go:204] [ 1015: 1016] Signal 1015, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.397974 30218 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.397983 30218 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.397990 30218 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.397999 30218 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.398005 30218 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.398008 30218 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.398014 30218 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.399200 30218 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.399243 30218 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.399260 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.399287 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.399294 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.399518 30218 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.399949 30218 task_signals.go:470] [ 7: 9] Notified of signal 23 D0712 20:23:46.400187 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.401529 30218 syscalls.go:262] [ 1020: 1020] Allocating stack with size of 8388608 bytes D0712 20:23:46.401655 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.401826 30218 task_signals.go:220] [ 7: 9] Signal 23: delivering to handler D0712 20:23:46.404081 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.404116 30218 usertrap_amd64.go:106] [ 1020: 1020] Map a usertrap vma at 69000 D0712 20:23:46.404197 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 1 D0712 20:23:46.404217 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:46.404418 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.404437 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 2 D0712 20:23:46.404446 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:46.405048 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.405070 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 3 D0712 20:23:46.405082 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:46.413595 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.413638 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 4 D0712 20:23:46.413652 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:46.414969 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.415001 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 5 D0712 20:23:46.415022 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:46.415078 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.415097 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 6 D0712 20:23:46.415115 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:46.415609 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.415641 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 7 D0712 20:23:46.415652 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:46.416567 30218 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.416615 30218 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc000ecc0c0 8 D0712 20:23:46.416633 30218 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:46.416788 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.416808 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 9 D0712 20:23:46.416819 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:46.416853 30218 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.416864 30218 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc000ecc0c0 10 D0712 20:23:46.416873 30218 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:46.429247 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.429305 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 11 D0712 20:23:46.429318 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:46.430125 30218 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.430166 30218 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc000ecc0c0 12 D0712 20:23:46.430182 30218 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:46.430211 30218 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.430236 30218 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc000ecc0c0 13 D0712 20:23:46.430246 30218 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:46.430266 30218 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0712 20:23:46.430297 30218 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0712 20:23:46.440908 30218 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.440988 30218 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc000ecc0c0 14 D0712 20:23:46.441006 30218 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:46.441047 30218 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.441071 30218 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.441107 30218 task_signals.go:204] [ 1020: 1025] Signal 1020, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.441119 30218 task_exit.go:204] [ 1020: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.441118 30218 task_signals.go:204] [ 1020: 1023] Signal 1020, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.441127 30218 task_exit.go:204] [ 1020: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.441133 30218 task_exit.go:204] [ 1020: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.441100 30218 task_signals.go:204] [ 1020: 1022] Signal 1020, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.441149 30218 task_signals.go:204] [ 1020: 1024] Signal 1020, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.441159 30218 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.441176 30218 task_signals.go:204] [ 1020: 1021] Signal 1020, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.441188 30218 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.441194 30218 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.441204 30218 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.441211 30218 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.441240 30218 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.441253 30218 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.441259 30218 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.441266 30218 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.441275 30218 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.442600 30218 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.442624 30218 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.442638 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.442698 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.442740 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.442835 30218 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.443785 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.445377 30218 syscalls.go:262] [ 1026: 1026] Allocating stack with size of 8388608 bytes D0712 20:23:46.445761 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.446859 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.446899 30218 usertrap_amd64.go:106] [ 1026: 1026] Map a usertrap vma at 6a000 D0712 20:23:46.446986 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 1 D0712 20:23:46.447023 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:46.447492 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.447559 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 2 D0712 20:23:46.447614 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:46.450766 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.450832 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 3 D0712 20:23:46.450856 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:46.457441 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.457470 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 4 D0712 20:23:46.457480 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:46.458588 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.458662 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 5 D0712 20:23:46.458729 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:46.458839 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.458862 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 6 D0712 20:23:46.458873 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:46.459166 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.459191 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 7 D0712 20:23:46.459201 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:46.459454 30218 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.459485 30218 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc0004edc20 8 D0712 20:23:46.459498 30218 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:46.459589 30218 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.459607 30218 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc0004edc20 9 D0712 20:23:46.459614 30218 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:46.459659 30218 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.459668 30218 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc0004edc20 10 D0712 20:23:46.459690 30218 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46b020 trap addr 6a320 ([184 39 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:46.459819 30218 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.459844 30218 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc0004edc20 11 D0712 20:23:46.459852 30218 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46b04f trap addr 6a370 ([184 234 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:46.460003 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.460029 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 12 D0712 20:23:46.460038 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b57c trap addr 6a3c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:46.460474 30218 task_signals.go:470] [ 1026: 1026] Notified of signal 23 D0712 20:23:46.460571 30218 task_signals.go:220] [ 1026: 1026] Signal 23: delivering to handler D0712 20:23:46.467728 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.467841 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 13 D0712 20:23:46.467942 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:46.470649 30218 task_signals.go:470] [ 1026: 1026] Notified of signal 23 D0712 20:23:46.470723 30218 task_signals.go:220] [ 1026: 1026] Signal 23: delivering to handler D0712 20:23:46.478448 30218 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.478480 30218 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc0004edc20 14 D0712 20:23:46.478509 30218 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:46.478545 30218 task_exit.go:204] [ 1026: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.478581 30218 task_exit.go:204] [ 1026: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.478595 30218 task_signals.go:204] [ 1026: 1029] Signal 1026, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.478609 30218 task_signals.go:204] [ 1026: 1028] Signal 1026, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.478621 30218 task_exit.go:204] [ 1026: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.478585 30218 task_signals.go:204] [ 1026: 1027] Signal 1026, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.478650 30218 task_exit.go:204] [ 1026: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.478656 30218 task_exit.go:204] [ 1026: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.478676 30218 task_exit.go:204] [ 1026: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.478690 30218 task_exit.go:204] [ 1026: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.478694 30218 task_exit.go:204] [ 1026: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.478702 30218 task_exit.go:204] [ 1026: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.480036 30218 task_exit.go:204] [ 1026: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.480070 30218 task_exit.go:204] [ 1026: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.480089 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.480112 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.480120 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.480251 30218 task_exit.go:204] [ 1026: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.480881 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.482516 30218 syscalls.go:262] [ 1030: 1030] Allocating stack with size of 8388608 bytes D0712 20:23:46.482669 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.484807 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.484859 30218 usertrap_amd64.go:106] [ 1030: 1030] Map a usertrap vma at 60000 D0712 20:23:46.485020 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 1 D0712 20:23:46.485079 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:46.485527 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.485555 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 2 D0712 20:23:46.485572 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:46.486098 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.486132 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 3 D0712 20:23:46.486144 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:46.491737 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.491795 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 4 D0712 20:23:46.491816 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:46.493157 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.493187 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 5 D0712 20:23:46.493204 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:46.493250 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.493266 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 6 D0712 20:23:46.493275 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:46.493647 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.493684 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 7 D0712 20:23:46.493700 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:46.494067 30218 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.494092 30218 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000e0ac90 8 D0712 20:23:46.494105 30218 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:46.494236 30218 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.494264 30218 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000e0ac90 9 D0712 20:23:46.494277 30218 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:46.494289 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.494301 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 10 D0712 20:23:46.494311 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:46.494445 30218 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.494466 30218 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000e0ac90 11 D0712 20:23:46.494476 30218 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:46.494518 30218 usertrap_amd64.go:212] [ 1030: 1031] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.494540 30218 usertrap_amd64.go:122] [ 1030: 1031] Allocate a new trap: 0xc000e0ac90 12 D0712 20:23:46.494551 30218 usertrap_amd64.go:225] [ 1030: 1031] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:46.494713 30218 task_signals.go:470] [ 1030: 1033] Notified of signal 23 D0712 20:23:46.494772 30218 task_signals.go:179] [ 1030: 1033] Restarting syscall 202: interrupted by signal 23 D0712 20:23:46.494783 30218 task_signals.go:220] [ 1030: 1033] Signal 23: delivering to handler D0712 20:23:46.505039 30218 task_signals.go:470] [ 1030: 1030] Notified of signal 23 D0712 20:23:46.505095 30218 task_signals.go:220] [ 1030: 1030] Signal 23: delivering to handler D0712 20:23:46.509778 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.509819 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 13 D0712 20:23:46.509834 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:46.516026 30218 task_signals.go:470] [ 1030: 1030] Notified of signal 23 D0712 20:23:46.516116 30218 task_signals.go:220] [ 1030: 1030] Signal 23: delivering to handler D0712 20:23:46.519997 30218 usertrap_amd64.go:212] [ 1030: 1030] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.520034 30218 usertrap_amd64.go:122] [ 1030: 1030] Allocate a new trap: 0xc000e0ac90 14 D0712 20:23:46.520058 30218 usertrap_amd64.go:225] [ 1030: 1030] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:46.520127 30218 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.520157 30218 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.520181 30218 task_signals.go:204] [ 1030: 1033] Signal 1030, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.520195 30218 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.520202 30218 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.520207 30218 task_exit.go:204] [ 1030: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.520230 30218 task_signals.go:204] [ 1030: 1034] Signal 1030, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.520240 30218 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.520246 30218 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.520251 30218 task_exit.go:204] [ 1030: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.520262 30218 task_signals.go:204] [ 1030: 1032] Signal 1030, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.520272 30218 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.520279 30218 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.520296 30218 task_exit.go:204] [ 1030: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.520426 30218 task_signals.go:204] [ 1030: 1031] Signal 1030, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.520478 30218 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.521715 30218 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.521794 30218 task_exit.go:204] [ 1030: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.521829 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.521888 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.521898 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.522041 30218 task_exit.go:204] [ 1030: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.522225 30218 task_signals.go:470] [ 7: 14] Notified of signal 23 D0712 20:23:46.522296 30218 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0712 20:23:46.522931 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.524196 30218 syscalls.go:262] [ 1035: 1035] Allocating stack with size of 8388608 bytes D0712 20:23:46.524369 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.525547 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.525583 30218 usertrap_amd64.go:106] [ 1035: 1035] Map a usertrap vma at 67000 D0712 20:23:46.525737 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 1 D0712 20:23:46.525769 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:23:46.527768 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.527807 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 2 D0712 20:23:46.527825 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:23:46.528419 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.528441 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 3 D0712 20:23:46.528454 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:23:46.537148 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.537166 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 4 D0712 20:23:46.537177 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:23:46.538300 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.538336 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 5 D0712 20:23:46.538353 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:23:46.538407 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.538421 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 6 D0712 20:23:46.538430 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:23:46.538798 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.538822 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 7 D0712 20:23:46.538832 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:23:46.539317 30218 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.539351 30218 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc001a81230 8 D0712 20:23:46.539367 30218 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:23:46.539565 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.539584 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 9 D0712 20:23:46.539595 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:23:46.539627 30218 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.539634 30218 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc001a81230 10 D0712 20:23:46.539641 30218 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:23:46.547854 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.547881 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 11 D0712 20:23:46.547893 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:23:46.550391 30218 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.550426 30218 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc001a81230 12 D0712 20:23:46.550446 30218 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:23:46.550498 30218 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.550510 30218 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc001a81230 13 D0712 20:23:46.550517 30218 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:23:46.550532 30218 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0712 20:23:46.550578 30218 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0712 20:23:46.557876 30218 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.557919 30218 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001a81230 14 D0712 20:23:46.557934 30218 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:23:46.558168 30218 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.558208 30218 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.558227 30218 task_signals.go:204] [ 1035: 1036] Signal 1035, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.558244 30218 task_signals.go:204] [ 1035: 1037] Signal 1035, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.558249 30218 task_signals.go:204] [ 1035: 1039] Signal 1035, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.558260 30218 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.558284 30218 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.558302 30218 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.558322 30218 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.558342 30218 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.558348 30218 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.558367 30218 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.558376 30218 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.558381 30218 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.558394 30218 task_signals.go:204] [ 1035: 1038] Signal 1035, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.558406 30218 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.559639 30218 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.559669 30218 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.559683 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.561035 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.561074 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.561160 30218 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.561740 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.563100 30218 syscalls.go:262] [ 1040: 1040] Allocating stack with size of 8388608 bytes D0712 20:23:46.563198 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.564362 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.564410 30218 usertrap_amd64.go:106] [ 1040: 1040] Map a usertrap vma at 69000 D0712 20:23:46.564490 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 1 D0712 20:23:46.564525 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:46.565107 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.565134 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 2 D0712 20:23:46.565147 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:46.565821 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.565851 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 3 D0712 20:23:46.565864 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:46.573069 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.573103 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 4 D0712 20:23:46.573117 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:46.574180 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.574208 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 5 D0712 20:23:46.574218 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:46.574276 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.574294 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 6 D0712 20:23:46.574302 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:46.574462 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.574480 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 7 D0712 20:23:46.574487 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:46.574682 30218 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.574742 30218 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0006d4180 8 D0712 20:23:46.574760 30218 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:46.574888 30218 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.574912 30218 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0006d4180 9 D0712 20:23:46.574922 30218 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:46.575037 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.575050 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 10 D0712 20:23:46.575059 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:46.583610 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.583641 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 11 D0712 20:23:46.583654 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:46.586293 30218 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.586334 30218 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0006d4180 12 D0712 20:23:46.586346 30218 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:46.586407 30218 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.586427 30218 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0006d4180 13 D0712 20:23:46.586451 30218 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:46.586493 30218 task_signals.go:470] [ 1040: 1040] Notified of signal 23 D0712 20:23:46.586568 30218 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler D0712 20:23:46.593549 30218 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.593579 30218 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0006d4180 14 D0712 20:23:46.593589 30218 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:46.593645 30218 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.593667 30218 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.593683 30218 task_signals.go:204] [ 1040: 1042] Signal 1040, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.593707 30218 task_signals.go:204] [ 1040: 1044] Signal 1040, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.593717 30218 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.593731 30218 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.593738 30218 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.593688 30218 task_signals.go:204] [ 1040: 1043] Signal 1040, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.593770 30218 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.593779 30218 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.593785 30218 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.593720 30218 task_signals.go:204] [ 1040: 1041] Signal 1040, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.593793 30218 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.593804 30218 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.593824 30218 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.593844 30218 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.594918 30218 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.594948 30218 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.594960 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.594991 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.595000 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.595210 30218 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.595933 30218 task_stop.go:118] [ 7: 10] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.597476 30218 syscalls.go:262] [ 1045: 1045] Allocating stack with size of 8388608 bytes D0712 20:23:46.597621 30218 task_stop.go:138] [ 7: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.598375 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.598417 30218 usertrap_amd64.go:106] [ 1045: 1045] Map a usertrap vma at 64000 D0712 20:23:46.598495 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 1 D0712 20:23:46.598537 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:46.598878 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.598913 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 2 D0712 20:23:46.598935 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:46.599646 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.599663 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 3 D0712 20:23:46.599690 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:46.605885 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.605923 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 4 D0712 20:23:46.605937 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:46.607300 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.607336 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 5 D0712 20:23:46.607350 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:46.607654 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.607688 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 6 D0712 20:23:46.607698 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:46.608143 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.608166 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 7 D0712 20:23:46.608174 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:46.608341 30218 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.608366 30218 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000ff10e0 8 D0712 20:23:46.608378 30218 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:46.608485 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.608505 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 9 D0712 20:23:46.608515 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:46.608545 30218 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.608552 30218 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000ff10e0 10 D0712 20:23:46.608559 30218 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:46.615784 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.615810 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 11 D0712 20:23:46.615823 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:46.619230 30218 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.619254 30218 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000ff10e0 12 D0712 20:23:46.619266 30218 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:46.619289 30218 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.619296 30218 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc000ff10e0 13 D0712 20:23:46.619303 30218 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:46.619322 30218 task_signals.go:470] [ 1045: 1045] Notified of signal 23 D0712 20:23:46.619447 30218 task_signals.go:220] [ 1045: 1045] Signal 23: delivering to handler I0712 20:23:46.625404 30218 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0712 20:23:46.625486 30218 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.625505 30218 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc000ff10e0 14 D0712 20:23:46.625517 30218 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:46.625592 30218 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.625631 30218 task_signals.go:204] [ 1045: 1049] Signal 1045, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.625657 30218 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.625675 30218 task_signals.go:204] [ 1045: 1047] Signal 1045, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.625688 30218 task_signals.go:204] [ 1045: 1046] Signal 1045, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.625700 30218 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.625712 30218 task_signals.go:204] [ 1045: 1048] Signal 1045, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.625725 30218 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.625732 30218 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.625752 30218 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.625761 30218 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.625766 30218 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.625775 30218 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.625782 30218 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.625787 30218 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.625808 30218 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.626935 30218 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.626963 30218 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.626975 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.627009 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.627030 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.627106 30218 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.627527 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.628817 30218 syscalls.go:262] [ 1050: 1050] Allocating stack with size of 8388608 bytes D0712 20:23:46.628891 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.629716 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.629761 30218 usertrap_amd64.go:106] [ 1050: 1050] Map a usertrap vma at 64000 D0712 20:23:46.629830 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 1 D0712 20:23:46.629866 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:46.630305 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.630342 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 2 D0712 20:23:46.630359 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:46.631027 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.631059 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 3 D0712 20:23:46.631070 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:46.637209 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.637229 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 4 D0712 20:23:46.637243 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:46.638306 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.638323 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 5 D0712 20:23:46.638336 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:46.638374 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.638378 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 6 D0712 20:23:46.638384 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:46.638574 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.638583 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 7 D0712 20:23:46.638602 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:46.638759 30218 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.638784 30218 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0006d4420 8 D0712 20:23:46.638793 30218 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:46.639077 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.639102 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 9 D0712 20:23:46.639112 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:46.639153 30218 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.639182 30218 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0006d4420 10 D0712 20:23:46.639196 30218 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:46.639893 30218 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.639921 30218 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0006d4420 11 D0712 20:23:46.639934 30218 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:46.639963 30218 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.639979 30218 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0006d4420 12 D0712 20:23:46.639986 30218 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:46.640008 30218 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0712 20:23:46.640075 30218 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler D0712 20:23:46.646787 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.646818 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 13 D0712 20:23:46.646831 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:46.650386 30218 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0712 20:23:46.650437 30218 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler I0712 20:23:46.655525 30218 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0712 20:23:46.655612 30218 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.655631 30218 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0006d4420 14 D0712 20:23:46.655641 30218 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:46.655713 30218 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.655744 30218 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.655759 30218 task_signals.go:204] [ 1050: 1051] Signal 1050, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.655775 30218 task_signals.go:204] [ 1050: 1052] Signal 1050, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.655782 30218 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.655787 30218 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.655791 30218 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.655786 30218 task_signals.go:204] [ 1050: 1054] Signal 1050, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.655804 30218 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.655813 30218 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.655818 30218 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.655764 30218 task_signals.go:204] [ 1050: 1053] Signal 1050, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.655826 30218 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.655832 30218 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.655837 30218 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.655844 30218 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.656785 30218 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.656869 30218 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.656886 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.656931 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.657041 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.657108 30218 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.657457 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.658818 30218 syscalls.go:262] [ 1055: 1055] Allocating stack with size of 8388608 bytes D0712 20:23:46.658928 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.659980 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.660022 30218 usertrap_amd64.go:106] [ 1055: 1055] Map a usertrap vma at 68000 D0712 20:23:46.660101 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 1 D0712 20:23:46.660130 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:46.660516 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.660540 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 2 D0712 20:23:46.660547 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:46.661020 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.661044 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 3 D0712 20:23:46.661054 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:46.666539 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.666609 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 4 D0712 20:23:46.666623 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:46.667602 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.667623 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 5 D0712 20:23:46.667635 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:46.667702 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.667717 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 6 D0712 20:23:46.667729 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:46.668082 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.668110 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 7 D0712 20:23:46.668122 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:46.668276 30218 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.668293 30218 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc000eccae0 8 D0712 20:23:46.668302 30218 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:46.668415 30218 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.668430 30218 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc000eccae0 9 D0712 20:23:46.668438 30218 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:46.668581 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.668610 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 10 D0712 20:23:46.668624 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:46.674841 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.674876 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 11 D0712 20:23:46.674889 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:46.679115 30218 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.679144 30218 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc000eccae0 12 D0712 20:23:46.679155 30218 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:46.679176 30218 usertrap_amd64.go:212] [ 1055: 1056] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.679183 30218 usertrap_amd64.go:122] [ 1055: 1056] Allocate a new trap: 0xc000eccae0 13 D0712 20:23:46.679191 30218 usertrap_amd64.go:225] [ 1055: 1056] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:46.679208 30218 task_signals.go:470] [ 1055: 1055] Notified of signal 23 D0712 20:23:46.679279 30218 task_signals.go:220] [ 1055: 1055] Signal 23: delivering to handler I0712 20:23:46.684346 30218 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0712 20:23:46.684473 30218 usertrap_amd64.go:212] [ 1055: 1055] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.684504 30218 usertrap_amd64.go:122] [ 1055: 1055] Allocate a new trap: 0xc000eccae0 14 D0712 20:23:46.684516 30218 usertrap_amd64.go:225] [ 1055: 1055] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:46.684562 30218 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.684582 30218 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.684597 30218 task_signals.go:204] [ 1055: 1057] Signal 1055, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.684618 30218 task_signals.go:204] [ 1055: 1056] Signal 1055, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.684626 30218 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.684604 30218 task_signals.go:204] [ 1055: 1058] Signal 1055, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.684636 30218 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.684625 30218 task_signals.go:204] [ 1055: 1059] Signal 1055, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.684644 30218 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.684651 30218 task_exit.go:204] [ 1055: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.684662 30218 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.684677 30218 task_exit.go:204] [ 1055: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.684686 30218 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.684694 30218 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.684698 30218 task_exit.go:204] [ 1055: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.684704 30218 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.685726 30218 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.685760 30218 task_exit.go:204] [ 1055: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.685778 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.685803 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.685811 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.685864 30218 task_exit.go:204] [ 1055: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.686245 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.687408 30218 syscalls.go:262] [ 1060: 1060] Allocating stack with size of 8388608 bytes D0712 20:23:46.687482 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.688391 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.688442 30218 usertrap_amd64.go:106] [ 1060: 1060] Map a usertrap vma at 68000 D0712 20:23:46.688536 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 1 D0712 20:23:46.688572 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:46.688801 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.688821 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 2 D0712 20:23:46.688829 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:46.689229 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.689250 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 3 D0712 20:23:46.689259 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:46.694674 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.694691 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 4 D0712 20:23:46.694700 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:46.695672 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.695722 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 5 D0712 20:23:46.695741 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:46.695775 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.695780 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 6 D0712 20:23:46.695785 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:46.695945 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.695965 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 7 D0712 20:23:46.695974 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:46.696090 30218 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.696108 30218 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc001a81890 8 D0712 20:23:46.696117 30218 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:46.696262 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.696288 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 9 D0712 20:23:46.696298 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:46.696328 30218 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.696343 30218 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc001a81890 10 D0712 20:23:46.696351 30218 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:46.696390 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46b6e0:sysno 24 D0712 20:23:46.696419 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 11 D0712 20:23:46.696432 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:46.696761 30218 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.696776 30218 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc001a81890 12 D0712 20:23:46.696787 30218 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:46.696816 30218 usertrap_amd64.go:212] [ 1060: 1061] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.696827 30218 usertrap_amd64.go:122] [ 1060: 1061] Allocate a new trap: 0xc001a81890 13 D0712 20:23:46.696840 30218 usertrap_amd64.go:225] [ 1060: 1061] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:46.696864 30218 task_signals.go:470] [ 1060: 1060] Notified of signal 23 D0712 20:23:46.701058 30218 task_signals.go:220] [ 1060: 1060] Signal 23: delivering to handler D0712 20:23:46.701358 30218 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0712 20:23:46.706772 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.706806 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 14 D0712 20:23:46.706820 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46af29 trap addr 68460 ([184 37 1 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:46.711803 30218 task_signals.go:470] [ 1060: 1060] Notified of signal 23 D0712 20:23:46.711858 30218 task_signals.go:220] [ 1060: 1060] Signal 23: delivering to handler I0712 20:23:46.716873 30218 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0712 20:23:46.716975 30218 usertrap_amd64.go:212] [ 1060: 1060] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.716998 30218 usertrap_amd64.go:122] [ 1060: 1060] Allocate a new trap: 0xc001a81890 15 D0712 20:23:46.717009 30218 usertrap_amd64.go:225] [ 1060: 1060] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 20:23:46.717058 30218 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.717089 30218 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.717113 30218 task_signals.go:204] [ 1060: 1061] Signal 1060, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.717127 30218 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.717136 30218 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.717151 30218 task_exit.go:204] [ 1060: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.717165 30218 task_signals.go:204] [ 1060: 1062] Signal 1060, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.717175 30218 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.717199 30218 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.717206 30218 task_exit.go:204] [ 1060: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.717223 30218 task_signals.go:204] [ 1060: 1063] Signal 1060, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.717235 30218 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.717241 30218 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.717245 30218 task_exit.go:204] [ 1060: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.717253 30218 task_signals.go:204] [ 1060: 1064] Signal 1060, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.717268 30218 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.718195 30218 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.718223 30218 task_exit.go:204] [ 1060: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.718232 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.718265 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.718275 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.718428 30218 task_exit.go:204] [ 1060: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.718913 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.720125 30218 syscalls.go:262] [ 1065: 1065] Allocating stack with size of 8388608 bytes D0712 20:23:46.720223 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.721335 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.721372 30218 usertrap_amd64.go:106] [ 1065: 1065] Map a usertrap vma at 60000 D0712 20:23:46.721438 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 1 D0712 20:23:46.721454 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:46.721928 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.721944 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 2 D0712 20:23:46.721954 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:46.722458 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.722472 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 3 D0712 20:23:46.722479 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:46.727774 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.727833 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 4 D0712 20:23:46.727851 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:46.728876 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.728902 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 5 D0712 20:23:46.728912 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:46.728993 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.729002 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 6 D0712 20:23:46.729007 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:46.729301 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.729314 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 7 D0712 20:23:46.729324 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:46.729441 30218 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.729468 30218 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc001a81aa0 8 D0712 20:23:46.729480 30218 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:46.729635 30218 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.729664 30218 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc001a81aa0 9 D0712 20:23:46.729697 30218 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:46.729770 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.729791 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 10 D0712 20:23:46.729807 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:46.736442 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.736488 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 11 D0712 20:23:46.736509 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:46.740369 30218 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.740623 30218 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc001a81aa0 12 D0712 20:23:46.740656 30218 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:46.740762 30218 usertrap_amd64.go:212] [ 1065: 1066] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.740787 30218 usertrap_amd64.go:122] [ 1065: 1066] Allocate a new trap: 0xc001a81aa0 13 D0712 20:23:46.740798 30218 usertrap_amd64.go:225] [ 1065: 1066] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:46.740848 30218 task_signals.go:470] [ 1065: 1065] Notified of signal 23 D0712 20:23:46.740929 30218 task_signals.go:220] [ 1065: 1065] Signal 23: delivering to handler D0712 20:23:46.746297 30218 usertrap_amd64.go:212] [ 1065: 1065] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.746325 30218 usertrap_amd64.go:122] [ 1065: 1065] Allocate a new trap: 0xc001a81aa0 14 D0712 20:23:46.746334 30218 usertrap_amd64.go:225] [ 1065: 1065] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:46.746387 30218 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.746416 30218 task_signals.go:204] [ 1065: 1066] Signal 1065, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.746413 30218 task_signals.go:204] [ 1065: 1067] Signal 1065, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.746438 30218 task_signals.go:204] [ 1065: 1069] Signal 1065, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.746453 30218 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.746495 30218 task_signals.go:204] [ 1065: 1070] Signal 1065, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.746524 30218 task_exit.go:204] [ 1065: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.746564 30218 task_signals.go:204] [ 1065: 1068] Signal 1065, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.746591 30218 task_exit.go:204] [ 1065: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.746598 30218 task_exit.go:204] [ 1065: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.746610 30218 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.746624 30218 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.746629 30218 task_exit.go:204] [ 1065: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.746636 30218 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.746647 30218 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.746657 30218 task_exit.go:204] [ 1065: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.746664 30218 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.746668 30218 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.746672 30218 task_exit.go:204] [ 1065: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.746677 30218 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.747747 30218 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.747780 30218 task_exit.go:204] [ 1065: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.747793 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.747819 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.747828 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.747980 30218 task_exit.go:204] [ 1065: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.748540 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.750098 30218 syscalls.go:262] [ 1071: 1071] Allocating stack with size of 8388608 bytes D0712 20:23:46.750210 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.751181 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.751218 30218 usertrap_amd64.go:106] [ 1071: 1071] Map a usertrap vma at 64000 D0712 20:23:46.751367 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 1 D0712 20:23:46.751454 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:46.751866 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.751890 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 2 D0712 20:23:46.751898 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:46.752347 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.752370 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 3 D0712 20:23:46.752377 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:46.758093 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.758125 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 4 D0712 20:23:46.758135 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:46.759216 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.759241 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 5 D0712 20:23:46.759252 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:46.759607 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.759621 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 6 D0712 20:23:46.759626 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:46.759962 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.759977 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 7 D0712 20:23:46.759983 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:46.760115 30218 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.760140 30218 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc0006d4780 8 D0712 20:23:46.760154 30218 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:46.760280 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.760306 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 9 D0712 20:23:46.760315 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:46.760325 30218 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.760331 30218 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc0006d4780 10 D0712 20:23:46.760341 30218 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:46.767131 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.767169 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 11 D0712 20:23:46.767181 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:46.770640 30218 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.770672 30218 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc0006d4780 12 D0712 20:23:46.770685 30218 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:46.770717 30218 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.770733 30218 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc0006d4780 13 D0712 20:23:46.770744 30218 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:46.770833 30218 task_signals.go:470] [ 1071: 1071] Notified of signal 23 D0712 20:23:46.770946 30218 task_signals.go:220] [ 1071: 1071] Signal 23: delivering to handler D0712 20:23:46.776754 30218 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.776790 30218 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0006d4780 14 D0712 20:23:46.776806 30218 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:46.776834 30218 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.776879 30218 task_signals.go:204] [ 1071: 1075] Signal 1071, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.776913 30218 task_signals.go:204] [ 1071: 1074] Signal 1071, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.776926 30218 task_signals.go:204] [ 1071: 1073] Signal 1071, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.776933 30218 task_signals.go:204] [ 1071: 1072] Signal 1071, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.776982 30218 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.776991 30218 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.777002 30218 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.777008 30218 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.777035 30218 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.777045 30218 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.777083 30218 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.777095 30218 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.777105 30218 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.777111 30218 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.777124 30218 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.778345 30218 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.778416 30218 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.778433 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.778461 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.778471 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.778575 30218 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.779515 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.781033 30218 syscalls.go:262] [ 1076: 1076] Allocating stack with size of 8388608 bytes D0712 20:23:46.781126 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.782393 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.782426 30218 usertrap_amd64.go:106] [ 1076: 1076] Map a usertrap vma at 69000 D0712 20:23:46.782529 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 1 D0712 20:23:46.782551 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:46.782796 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.782815 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 2 D0712 20:23:46.782822 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:46.783515 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.783545 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 3 D0712 20:23:46.783557 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:46.789214 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.789229 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 4 D0712 20:23:46.789243 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:46.790489 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.790511 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 5 D0712 20:23:46.790524 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:46.790596 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.790616 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 6 D0712 20:23:46.790624 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:46.790908 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.790928 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 7 D0712 20:23:46.790935 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:46.791068 30218 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.791097 30218 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000ff1290 8 D0712 20:23:46.791108 30218 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:46.791344 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.791368 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 9 D0712 20:23:46.791378 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:46.791389 30218 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.791395 30218 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000ff1290 10 D0712 20:23:46.791403 30218 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:46.797563 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.797589 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 11 D0712 20:23:46.797600 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:46.802968 30218 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.802995 30218 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000ff1290 12 D0712 20:23:46.803006 30218 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:46.803049 30218 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.803065 30218 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000ff1290 13 D0712 20:23:46.803083 30218 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:46.803130 30218 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0712 20:23:46.803201 30218 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0712 20:23:46.806566 30218 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.806592 30218 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000ff1290 14 D0712 20:23:46.806601 30218 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:46.806640 30218 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.806666 30218 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.806683 30218 task_signals.go:204] [ 1076: 1079] Signal 1076, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.806676 30218 task_signals.go:204] [ 1076: 1078] Signal 1076, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.806693 30218 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.806698 30218 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.806703 30218 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.806869 30218 task_signals.go:204] [ 1076: 1077] Signal 1076, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.806894 30218 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.806895 30218 task_signals.go:204] [ 1076: 1080] Signal 1076, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.806911 30218 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.806919 30218 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.806925 30218 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.806936 30218 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.806943 30218 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.806961 30218 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.808030 30218 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.808057 30218 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.808079 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.808167 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.808196 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.808217 30218 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.808928 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.810268 30218 syscalls.go:262] [ 1081: 1081] Allocating stack with size of 8388608 bytes D0712 20:23:46.810378 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.811068 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.811102 30218 usertrap_amd64.go:106] [ 1081: 1081] Map a usertrap vma at 6a000 D0712 20:23:46.811197 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 1 D0712 20:23:46.811231 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:46.812049 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.812070 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 2 D0712 20:23:46.812080 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:46.812509 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.812534 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 3 D0712 20:23:46.812543 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:46.817241 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.817265 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 4 D0712 20:23:46.817285 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:46.818130 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.818143 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 5 D0712 20:23:46.818152 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:46.818167 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.818174 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 6 D0712 20:23:46.818181 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:46.818358 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.818397 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 7 D0712 20:23:46.818415 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:46.818568 30218 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.818611 30218 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc0006d4a50 8 D0712 20:23:46.818634 30218 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:46.818866 30218 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.818898 30218 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc0006d4a50 9 D0712 20:23:46.818916 30218 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:46.818984 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.818993 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 10 D0712 20:23:46.819041 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:46.825139 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.825171 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 11 D0712 20:23:46.825182 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:46.829275 30218 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.829353 30218 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc0006d4a50 12 D0712 20:23:46.829450 30218 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:46.829488 30218 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.829505 30218 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc0006d4a50 13 D0712 20:23:46.829517 30218 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:46.829580 30218 task_signals.go:470] [ 1081: 1081] Notified of signal 23 D0712 20:23:46.829665 30218 task_signals.go:220] [ 1081: 1081] Signal 23: delivering to handler D0712 20:23:46.834459 30218 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.834487 30218 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc0006d4a50 14 D0712 20:23:46.834500 30218 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:46.834528 30218 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.834549 30218 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.834557 30218 task_signals.go:204] [ 1081: 1084] Signal 1081, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.834567 30218 task_signals.go:204] [ 1081: 1086] Signal 1081, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.834577 30218 task_signals.go:204] [ 1081: 1085] Signal 1081, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.834580 30218 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.834592 30218 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.834606 30218 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.834618 30218 task_exit.go:204] [ 1081: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.834629 30218 task_exit.go:204] [ 1081: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.834635 30218 task_exit.go:204] [ 1081: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.834650 30218 task_signals.go:204] [ 1081: 1082] Signal 1081, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.834666 30218 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.834674 30218 task_signals.go:204] [ 1081: 1083] Signal 1081, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.834685 30218 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.834691 30218 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.834710 30218 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.834725 30218 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.834731 30218 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.834749 30218 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.835723 30218 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.835756 30218 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.835767 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.835806 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.835829 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.835989 30218 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.836541 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.837617 30218 syscalls.go:262] [ 1087: 1087] Allocating stack with size of 8388608 bytes D0712 20:23:46.837714 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.838642 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.838676 30218 usertrap_amd64.go:106] [ 1087: 1087] Map a usertrap vma at 66000 D0712 20:23:46.838781 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 1 D0712 20:23:46.838818 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:46.839140 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.839179 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 2 D0712 20:23:46.839191 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:46.839571 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.839588 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 3 D0712 20:23:46.839601 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:46.844692 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.844715 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 4 D0712 20:23:46.844727 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:46.845739 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.845766 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 5 D0712 20:23:46.845777 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:46.845821 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.845827 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 6 D0712 20:23:46.845835 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:46.846082 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.846104 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 7 D0712 20:23:46.846112 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:46.846261 30218 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.846279 30218 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc000ff1320 8 D0712 20:23:46.846290 30218 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:46.846437 30218 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.846458 30218 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc000ff1320 9 D0712 20:23:46.846467 30218 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:46.846492 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.846521 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 10 D0712 20:23:46.846533 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:46.853270 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.853289 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 11 D0712 20:23:46.853297 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:46.856708 30218 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.856737 30218 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc000ff1320 12 D0712 20:23:46.856745 30218 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:46.856844 30218 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.856869 30218 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc000ff1320 13 D0712 20:23:46.856881 30218 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:46.856914 30218 task_signals.go:470] [ 1087: 1087] Notified of signal 23 D0712 20:23:46.857016 30218 task_signals.go:220] [ 1087: 1087] Signal 23: delivering to handler D0712 20:23:46.865353 30218 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.865380 30218 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000ff1320 14 D0712 20:23:46.865415 30218 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:46.865463 30218 task_exit.go:204] [ 1087: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.865529 30218 task_exit.go:204] [ 1087: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.865554 30218 task_signals.go:204] [ 1087: 1088] Signal 1087, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.865582 30218 task_exit.go:204] [ 1087: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.865590 30218 task_exit.go:204] [ 1087: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.865596 30218 task_exit.go:204] [ 1087: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.865610 30218 task_signals.go:204] [ 1087: 1091] Signal 1087, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.865622 30218 task_signals.go:204] [ 1087: 1090] Signal 1087, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.865641 30218 task_exit.go:204] [ 1087: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.865660 30218 task_signals.go:204] [ 1087: 1089] Signal 1087, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.865680 30218 task_exit.go:204] [ 1087: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.865687 30218 task_exit.go:204] [ 1087: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.865692 30218 task_exit.go:204] [ 1087: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.865701 30218 task_exit.go:204] [ 1087: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.865758 30218 task_exit.go:204] [ 1087: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.865788 30218 task_exit.go:204] [ 1087: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.866759 30218 task_exit.go:204] [ 1087: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.866795 30218 task_exit.go:204] [ 1087: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.866804 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.866823 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.866829 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.866959 30218 task_exit.go:204] [ 1087: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.867384 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.868422 30218 syscalls.go:262] [ 1092: 1092] Allocating stack with size of 8388608 bytes D0712 20:23:46.868590 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.869533 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.869629 30218 usertrap_amd64.go:106] [ 1092: 1092] Map a usertrap vma at 60000 D0712 20:23:46.869721 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 1 D0712 20:23:46.869748 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:46.869975 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.869993 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 2 D0712 20:23:46.870010 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:46.870757 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.870785 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 3 D0712 20:23:46.870797 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:46.875520 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.875544 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 4 D0712 20:23:46.875554 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:46.876514 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.876537 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 5 D0712 20:23:46.876544 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:46.876591 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.876605 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 6 D0712 20:23:46.876610 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:46.876754 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.876765 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 7 D0712 20:23:46.876770 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:46.876857 30218 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.876901 30218 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000ac2000 8 D0712 20:23:46.876911 30218 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:46.877221 30218 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.877299 30218 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000ac2000 9 D0712 20:23:46.877351 30218 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:46.877399 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.877408 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 10 D0712 20:23:46.877418 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:46.883766 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.883810 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 11 D0712 20:23:46.883825 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:46.887792 30218 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.887821 30218 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000ac2000 12 D0712 20:23:46.887834 30218 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:46.887872 30218 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.887879 30218 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000ac2000 13 D0712 20:23:46.887887 30218 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:46.887930 30218 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0712 20:23:46.888012 30218 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler I0712 20:23:46.892793 30218 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0712 20:23:46.892886 30218 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.892901 30218 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000ac2000 14 D0712 20:23:46.892908 30218 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:46.892966 30218 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.892990 30218 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.893011 30218 task_signals.go:204] [ 1092: 1093] Signal 1092, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.893033 30218 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.893026 30218 task_signals.go:204] [ 1092: 1095] Signal 1092, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.893039 30218 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.893052 30218 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.893069 30218 task_signals.go:204] [ 1092: 1096] Signal 1092, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.893082 30218 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.893069 30218 task_signals.go:204] [ 1092: 1097] Signal 1092, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.893102 30218 task_signals.go:204] [ 1092: 1094] Signal 1092, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.893110 30218 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.893115 30218 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.893122 30218 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.893127 30218 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.893130 30218 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.893136 30218 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.893141 30218 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.893144 30218 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.893150 30218 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.893993 30218 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.894010 30218 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.894019 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.894076 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.894098 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.894220 30218 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.894648 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.895901 30218 syscalls.go:262] [ 1098: 1098] Allocating stack with size of 8388608 bytes D0712 20:23:46.896034 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.897530 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.897607 30218 usertrap_amd64.go:106] [ 1098: 1098] Map a usertrap vma at 63000 D0712 20:23:46.897747 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 1 D0712 20:23:46.897784 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:46.898199 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.898221 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 2 D0712 20:23:46.898231 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:46.898975 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.899003 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 3 D0712 20:23:46.899014 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:46.904743 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.904773 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 4 D0712 20:23:46.904784 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:46.906082 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.906107 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 5 D0712 20:23:46.906118 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:46.906170 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.906204 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 6 D0712 20:23:46.906213 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:46.906466 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.906493 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 7 D0712 20:23:46.906502 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:46.906677 30218 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.906695 30218 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc0005bf3b0 8 D0712 20:23:46.906705 30218 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:46.906779 30218 usertrap_amd64.go:212] [ 1098: 1100] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.906801 30218 usertrap_amd64.go:122] [ 1098: 1100] Allocate a new trap: 0xc0005bf3b0 9 D0712 20:23:46.906809 30218 usertrap_amd64.go:225] [ 1098: 1100] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:46.906859 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.906869 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 10 D0712 20:23:46.906878 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:46.907298 30218 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.907360 30218 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc0005bf3b0 11 D0712 20:23:46.907400 30218 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:46.907464 30218 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.907480 30218 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc0005bf3b0 12 D0712 20:23:46.907490 30218 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:46.907524 30218 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0712 20:23:46.907617 30218 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler D0712 20:23:46.912873 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.912902 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 13 D0712 20:23:46.912914 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:46.917611 30218 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0712 20:23:46.918577 30218 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler I0712 20:23:46.922399 30218 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0712 20:23:46.922539 30218 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.922565 30218 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc0005bf3b0 14 D0712 20:23:46.922594 30218 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:46.922686 30218 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.922737 30218 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.922778 30218 task_signals.go:204] [ 1098: 1102] Signal 1098, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.922807 30218 task_signals.go:204] [ 1098: 1100] Signal 1098, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.922817 30218 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.922842 30218 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.922853 30218 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.922870 30218 task_signals.go:204] [ 1098: 1099] Signal 1098, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.922878 30218 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.922883 30218 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.922888 30218 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.922897 30218 task_signals.go:204] [ 1098: 1101] Signal 1098, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.922916 30218 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.922942 30218 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.922949 30218 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.922967 30218 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.923963 30218 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.924000 30218 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.924024 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.924058 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.924069 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.924159 30218 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.924658 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.926099 30218 syscalls.go:262] [ 1103: 1103] Allocating stack with size of 8388608 bytes D0712 20:23:46.926249 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.927615 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.927651 30218 usertrap_amd64.go:106] [ 1103: 1103] Map a usertrap vma at 6a000 D0712 20:23:46.927724 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 1 D0712 20:23:46.927759 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:46.927999 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.928019 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 2 D0712 20:23:46.928029 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:46.928542 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.928567 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 3 D0712 20:23:46.928578 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:46.933727 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.933751 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 4 D0712 20:23:46.933758 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:46.934755 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.934770 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 5 D0712 20:23:46.934779 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:46.934803 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.934809 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 6 D0712 20:23:46.934839 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:46.935131 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.935150 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 7 D0712 20:23:46.935159 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:46.935300 30218 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.935332 30218 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc0006d4ea0 8 D0712 20:23:46.935342 30218 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:46.935535 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.935559 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 9 D0712 20:23:46.935574 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:46.935598 30218 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.935605 30218 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc0006d4ea0 10 D0712 20:23:46.935613 30218 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:46.935761 30218 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.935780 30218 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc0006d4ea0 11 D0712 20:23:46.935788 30218 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:46.935861 30218 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.935886 30218 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc0006d4ea0 12 D0712 20:23:46.935898 30218 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:46.935953 30218 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0712 20:23:46.936009 30218 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0712 20:23:46.941573 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.941600 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 13 D0712 20:23:46.941616 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:46.946768 30218 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0712 20:23:46.946800 30218 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0712 20:23:46.950099 30218 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.950166 30218 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0006d4ea0 14 D0712 20:23:46.950199 30218 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:46.950320 30218 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.950359 30218 task_signals.go:204] [ 1103: 1105] Signal 1103, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.950359 30218 task_signals.go:204] [ 1103: 1107] Signal 1103, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.950380 30218 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.950380 30218 task_signals.go:204] [ 1103: 1104] Signal 1103, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.950413 30218 task_signals.go:204] [ 1103: 1106] Signal 1103, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.950435 30218 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.950449 30218 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.950459 30218 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.950472 30218 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.950490 30218 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.950496 30218 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.950504 30218 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.950512 30218 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.950526 30218 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.950536 30218 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.951426 30218 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.951482 30218 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.951499 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.951541 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.951557 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.951707 30218 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.952258 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.953469 30218 syscalls.go:262] [ 1108: 1108] Allocating stack with size of 8388608 bytes D0712 20:23:46.953562 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.954899 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.954941 30218 usertrap_amd64.go:106] [ 1108: 1108] Map a usertrap vma at 64000 D0712 20:23:46.955036 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 1 D0712 20:23:46.955067 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:23:46.955252 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.955273 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 2 D0712 20:23:46.955298 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:23:46.955752 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.955774 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 3 D0712 20:23:46.955781 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:23:46.961815 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.961843 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 4 D0712 20:23:46.961853 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:23:46.963017 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.963044 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 5 D0712 20:23:46.963052 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:23:46.963096 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.963101 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 6 D0712 20:23:46.963107 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:23:46.963264 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.963284 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 7 D0712 20:23:46.963293 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:23:46.963429 30218 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.963450 30218 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc000ecd6e0 8 D0712 20:23:46.963456 30218 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:23:46.963594 30218 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.963636 30218 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc000ecd6e0 9 D0712 20:23:46.963648 30218 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:23:46.963729 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.963750 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 10 D0712 20:23:46.963759 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:23:46.970489 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46af29:sysno 293 D0712 20:23:46.970522 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 11 D0712 20:23:46.970533 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:23:46.974091 30218 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b020:sysno 39 D0712 20:23:46.974126 30218 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc000ecd6e0 12 D0712 20:23:46.974142 30218 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:23:46.974225 30218 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:46.974260 30218 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc000ecd6e0 13 D0712 20:23:46.974270 30218 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:23:46.974316 30218 task_signals.go:470] [ 1108: 1108] Notified of signal 23 D0712 20:23:46.974401 30218 task_signals.go:220] [ 1108: 1108] Signal 23: delivering to handler D0712 20:23:46.979600 30218 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:46.979624 30218 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc000ecd6e0 14 D0712 20:23:46.979633 30218 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:23:46.979690 30218 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.979711 30218 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.979736 30218 task_signals.go:204] [ 1108: 1112] Signal 1108, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.979754 30218 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.979760 30218 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.979764 30218 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.979774 30218 task_signals.go:204] [ 1108: 1109] Signal 1108, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.979742 30218 task_signals.go:204] [ 1108: 1110] Signal 1108, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.979781 30218 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.979826 30218 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.979853 30218 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.979903 30218 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.979950 30218 task_signals.go:204] [ 1108: 1111] Signal 1108, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:46.980003 30218 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.980012 30218 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.980026 30218 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:46.981113 30218 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:46.981150 30218 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.981166 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:46.981205 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:46.981214 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:46.981326 30218 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:46.981627 30218 task_signals.go:470] [ 7: 17] Notified of signal 23 D0712 20:23:46.981671 30218 task_signals.go:220] [ 7: 17] Signal 23: delivering to handler D0712 20:23:46.982053 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.983458 30218 syscalls.go:262] [ 1113: 1113] Allocating stack with size of 8388608 bytes D0712 20:23:46.983679 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:46.984973 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:46.985036 30218 usertrap_amd64.go:106] [ 1113: 1113] Map a usertrap vma at 66000 D0712 20:23:46.985160 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 1 D0712 20:23:46.985266 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:46.985540 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:46.985565 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 2 D0712 20:23:46.985573 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:46.986516 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:46.986541 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 3 D0712 20:23:46.986550 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:46.991813 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:46.991839 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 4 D0712 20:23:46.991852 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:46.992818 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:46.992861 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 5 D0712 20:23:46.992873 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:46.992919 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b214:sysno 13 D0712 20:23:46.992932 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 6 D0712 20:23:46.992972 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:46.993537 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:46.993565 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 7 D0712 20:23:46.993574 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:46.993708 30218 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:46.993736 30218 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc0005bf9b0 8 D0712 20:23:46.993762 30218 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:46.993922 30218 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46af76:sysno 35 D0712 20:23:46.993947 30218 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc0005bf9b0 9 D0712 20:23:46.993957 30218 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:46.994020 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:46.994030 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 10 D0712 20:23:46.994038 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:46.999988 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.000037 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 11 D0712 20:23:47.000049 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:47.004380 30218 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.004409 30218 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc0005bf9b0 12 D0712 20:23:47.004486 30218 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:47.004533 30218 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.004543 30218 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc0005bf9b0 13 D0712 20:23:47.004553 30218 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:47.004571 30218 task_signals.go:470] [ 1113: 1113] Notified of signal 23 D0712 20:23:47.004596 30218 task_signals.go:179] [ 1113: 1113] Restarting syscall 202: interrupted by signal 23 D0712 20:23:47.004607 30218 task_signals.go:220] [ 1113: 1113] Signal 23: delivering to handler D0712 20:23:47.009562 30218 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.009626 30218 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0005bf9b0 14 D0712 20:23:47.009651 30218 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:47.009677 30218 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.009698 30218 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.009713 30218 task_signals.go:204] [ 1113: 1117] Signal 1113, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.009712 30218 task_signals.go:204] [ 1113: 1115] Signal 1113, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.009730 30218 task_signals.go:204] [ 1113: 1116] Signal 1113, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.009719 30218 task_signals.go:204] [ 1113: 1114] Signal 1113, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.009756 30218 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.009777 30218 task_signals.go:204] [ 1113: 1119] Signal 1113, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.009791 30218 task_signals.go:204] [ 1113: 1118] Signal 1113, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.009802 30218 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.009819 30218 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.009830 30218 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.009837 30218 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.009841 30218 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.009846 30218 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.009851 30218 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.009855 30218 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.009861 30218 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.009866 30218 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.009870 30218 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.009884 30218 task_exit.go:204] [ 1113: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.009888 30218 task_exit.go:204] [ 1113: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.009891 30218 task_exit.go:204] [ 1113: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.009898 30218 task_exit.go:204] [ 1113: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.010754 30218 task_exit.go:204] [ 1113: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.010857 30218 task_exit.go:204] [ 1113: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.010886 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.010911 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.010919 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.011013 30218 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.011429 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.012537 30218 syscalls.go:262] [ 1120: 1120] Allocating stack with size of 8388608 bytes D0712 20:23:47.012628 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.013603 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.013628 30218 usertrap_amd64.go:106] [ 1120: 1120] Map a usertrap vma at 61000 D0712 20:23:47.013975 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 1 D0712 20:23:47.014013 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:47.014298 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.014322 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 2 D0712 20:23:47.014331 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:47.014812 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.014830 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 3 D0712 20:23:47.014837 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:47.019192 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.019218 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 4 D0712 20:23:47.019228 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:47.020110 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.020132 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 5 D0712 20:23:47.020139 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:47.020181 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.020195 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 6 D0712 20:23:47.020217 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:47.020494 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.020512 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 7 D0712 20:23:47.020518 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:47.020590 30218 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.020597 30218 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000ecd7d0 8 D0712 20:23:47.020602 30218 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:47.020693 30218 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.020708 30218 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000ecd7d0 9 D0712 20:23:47.020714 30218 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:47.020726 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.020733 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 10 D0712 20:23:47.020749 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:47.026944 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.026965 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 11 D0712 20:23:47.026975 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:47.032472 30218 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.032510 30218 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000ecd7d0 12 D0712 20:23:47.032542 30218 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:47.032586 30218 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.032596 30218 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000ecd7d0 13 D0712 20:23:47.032604 30218 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:47.032619 30218 task_signals.go:470] [ 1120: 1120] Notified of signal 23 D0712 20:23:47.032685 30218 task_signals.go:220] [ 1120: 1120] Signal 23: delivering to handler D0712 20:23:47.035573 30218 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.035600 30218 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000ecd7d0 14 D0712 20:23:47.035608 30218 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:47.035655 30218 task_exit.go:204] [ 1120: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.035674 30218 task_exit.go:204] [ 1120: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.035695 30218 task_signals.go:204] [ 1120: 1121] Signal 1120, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.035705 30218 task_exit.go:204] [ 1120: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.035709 30218 task_exit.go:204] [ 1120: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.035713 30218 task_exit.go:204] [ 1120: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.035725 30218 task_signals.go:204] [ 1120: 1122] Signal 1120, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.035743 30218 task_exit.go:204] [ 1120: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.035748 30218 task_exit.go:204] [ 1120: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.035752 30218 task_exit.go:204] [ 1120: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.035765 30218 task_signals.go:204] [ 1120: 1123] Signal 1120, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.035776 30218 task_exit.go:204] [ 1120: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.035784 30218 task_exit.go:204] [ 1120: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.035791 30218 task_exit.go:204] [ 1120: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.035812 30218 task_signals.go:204] [ 1120: 1124] Signal 1120, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.035818 30218 task_exit.go:204] [ 1120: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.035823 30218 task_exit.go:204] [ 1120: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.035827 30218 task_exit.go:204] [ 1120: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.035837 30218 task_signals.go:204] [ 1120: 1125] Signal 1120, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.035854 30218 task_exit.go:204] [ 1120: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.036674 30218 task_exit.go:204] [ 1120: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.036698 30218 task_exit.go:204] [ 1120: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.036720 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.036747 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.036759 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.036820 30218 task_exit.go:204] [ 1120: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.037024 30218 task_signals.go:470] [ 7: 14] Notified of signal 23 D0712 20:23:47.037055 30218 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0712 20:23:47.037486 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.038590 30218 syscalls.go:262] [ 1126: 1126] Allocating stack with size of 8388608 bytes D0712 20:23:47.038669 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.039705 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.039740 30218 usertrap_amd64.go:106] [ 1126: 1126] Map a usertrap vma at 62000 D0712 20:23:47.039817 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 1 D0712 20:23:47.039844 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:47.040252 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.040277 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 2 D0712 20:23:47.040287 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:47.041284 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.041309 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 3 D0712 20:23:47.041318 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:47.046624 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.046653 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 4 D0712 20:23:47.046666 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:47.047959 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.047982 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 5 D0712 20:23:47.047999 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:47.048040 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.048045 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 6 D0712 20:23:47.048050 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:47.048203 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.048217 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 7 D0712 20:23:47.048222 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:47.048349 30218 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.048412 30218 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000ff1440 8 D0712 20:23:47.048428 30218 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:47.048639 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.048710 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 9 D0712 20:23:47.048740 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:47.048753 30218 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.048759 30218 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000ff1440 10 D0712 20:23:47.048766 30218 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:47.054846 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.054873 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 11 D0712 20:23:47.054881 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:47.059978 30218 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.060022 30218 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000ff1440 12 D0712 20:23:47.060036 30218 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:47.060110 30218 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.060189 30218 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000ff1440 13 D0712 20:23:47.060201 30218 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:47.060450 30218 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0712 20:23:47.060530 30218 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0712 20:23:47.063288 30218 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.063318 30218 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000ff1440 14 D0712 20:23:47.063331 30218 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:47.063404 30218 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.063444 30218 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.063466 30218 task_signals.go:204] [ 1126: 1127] Signal 1126, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.063483 30218 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.063491 30218 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.063497 30218 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.063511 30218 task_signals.go:204] [ 1126: 1128] Signal 1126, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.063528 30218 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.063535 30218 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.063541 30218 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.063556 30218 task_signals.go:204] [ 1126: 1129] Signal 1126, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.063565 30218 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.063572 30218 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.063577 30218 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.063589 30218 task_signals.go:204] [ 1126: 1130] Signal 1126, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.063609 30218 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.064457 30218 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.064479 30218 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.064497 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.064526 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.064538 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.064864 30218 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.065441 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.066765 30218 syscalls.go:262] [ 1131: 1131] Allocating stack with size of 8388608 bytes D0712 20:23:47.066908 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.067615 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.067645 30218 usertrap_amd64.go:106] [ 1131: 1131] Map a usertrap vma at 69000 D0712 20:23:47.067726 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 1 D0712 20:23:47.067769 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:47.068164 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.068194 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 2 D0712 20:23:47.068203 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:47.068635 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.068664 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 3 D0712 20:23:47.068675 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:47.073254 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.073310 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 4 D0712 20:23:47.073322 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:47.074258 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.074284 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 5 D0712 20:23:47.074291 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:47.074327 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.074332 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 6 D0712 20:23:47.074337 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:47.074596 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.074619 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 7 D0712 20:23:47.074627 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:47.074693 30218 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.074704 30218 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc000ecd8f0 8 D0712 20:23:47.074709 30218 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:47.074818 30218 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.074852 30218 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc000ecd8f0 9 D0712 20:23:47.074862 30218 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:47.074984 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.075009 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 10 D0712 20:23:47.075017 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:47.075169 30218 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.075199 30218 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc000ecd8f0 11 D0712 20:23:47.075210 30218 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:47.075260 30218 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.075289 30218 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc000ecd8f0 12 D0712 20:23:47.075298 30218 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:47.075314 30218 task_signals.go:470] [ 1131: 1134] Notified of signal 23 D0712 20:23:47.075357 30218 task_signals.go:220] [ 1131: 1134] Signal 23: delivering to handler D0712 20:23:47.081363 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.081393 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 13 D0712 20:23:47.081401 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:47.085852 30218 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0712 20:23:47.087089 30218 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler D0712 20:23:47.090443 30218 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.090470 30218 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc000ecd8f0 14 D0712 20:23:47.090480 30218 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:47.090539 30218 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.090568 30218 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.090591 30218 task_signals.go:204] [ 1131: 1133] Signal 1131, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.090601 30218 task_signals.go:204] [ 1131: 1136] Signal 1131, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.090616 30218 task_signals.go:204] [ 1131: 1135] Signal 1131, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.090626 30218 task_signals.go:204] [ 1131: 1134] Signal 1131, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.090649 30218 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.090714 30218 task_signals.go:204] [ 1131: 1132] Signal 1131, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.090741 30218 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.090759 30218 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.090775 30218 task_exit.go:204] [ 1131: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.090783 30218 task_exit.go:204] [ 1131: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.090786 30218 task_exit.go:204] [ 1131: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.090795 30218 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.090803 30218 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.090828 30218 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.090837 30218 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.090842 30218 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.090846 30218 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.090854 30218 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.091823 30218 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.091854 30218 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.091878 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.091912 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.091921 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.091981 30218 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.092529 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.093858 30218 syscalls.go:262] [ 1137: 1137] Allocating stack with size of 8388608 bytes D0712 20:23:47.093989 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.095209 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.101987 30218 usertrap_amd64.go:106] [ 1137: 1137] Map a usertrap vma at 65000 D0712 20:23:47.104507 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 1 D0712 20:23:47.104569 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:23:47.110412 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.110462 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 2 D0712 20:23:47.110484 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:23:47.111462 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.111488 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 3 D0712 20:23:47.111506 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:23:47.116883 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.116910 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 4 D0712 20:23:47.116923 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:23:47.117997 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.118023 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 5 D0712 20:23:47.118033 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:23:47.118095 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.118110 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 6 D0712 20:23:47.118115 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:23:47.118460 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.118477 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 7 D0712 20:23:47.118481 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:23:47.118624 30218 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.118651 30218 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc000ecd9e0 8 D0712 20:23:47.118658 30218 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:23:47.118806 30218 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.118833 30218 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc000ecd9e0 9 D0712 20:23:47.118842 30218 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:23:47.119052 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.119112 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 10 D0712 20:23:47.119154 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:23:47.127781 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.127905 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 11 D0712 20:23:47.127985 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:23:47.130718 30218 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.130800 30218 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc000ecd9e0 12 D0712 20:23:47.130820 30218 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:23:47.130949 30218 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.131016 30218 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc000ecd9e0 13 D0712 20:23:47.131063 30218 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:23:47.131130 30218 task_signals.go:470] [ 1137: 1137] Notified of signal 23 D0712 20:23:47.131213 30218 task_signals.go:220] [ 1137: 1137] Signal 23: delivering to handler D0712 20:23:47.139943 30218 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.139985 30218 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc000ecd9e0 14 D0712 20:23:47.140020 30218 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:23:47.140163 30218 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.140290 30218 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.140337 30218 task_signals.go:204] [ 1137: 1139] Signal 1137, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.140365 30218 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.140384 30218 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.140398 30218 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.140416 30218 task_signals.go:204] [ 1137: 1138] Signal 1137, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.140434 30218 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.140442 30218 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.140447 30218 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.140507 30218 task_signals.go:204] [ 1137: 1140] Signal 1137, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.140595 30218 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.140636 30218 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.140646 30218 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.140678 30218 task_signals.go:204] [ 1137: 1141] Signal 1137, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.140701 30218 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.142118 30218 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.142163 30218 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.142180 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.142217 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.142240 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.142462 30218 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.143239 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.144662 30218 syscalls.go:262] [ 1142: 1142] Allocating stack with size of 8388608 bytes D0712 20:23:47.144830 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.146457 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.146549 30218 usertrap_amd64.go:106] [ 1142: 1142] Map a usertrap vma at 68000 D0712 20:23:47.146641 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 1 D0712 20:23:47.146673 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:47.147073 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.147094 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 2 D0712 20:23:47.147102 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:47.147634 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.147659 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 3 D0712 20:23:47.147672 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:47.153356 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.153379 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 4 D0712 20:23:47.153389 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:47.154401 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.154436 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 5 D0712 20:23:47.154457 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:47.154511 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.154523 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 6 D0712 20:23:47.154528 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:47.154821 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.154846 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 7 D0712 20:23:47.154854 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:47.155019 30218 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.155035 30218 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0006d41b0 8 D0712 20:23:47.155046 30218 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:47.155189 30218 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.155208 30218 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0006d41b0 9 D0712 20:23:47.155217 30218 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:47.155465 30218 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.155544 30218 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0006d41b0 10 D0712 20:23:47.155596 30218 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46b020 trap addr 68320 ([184 39 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:47.155684 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.155714 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 11 D0712 20:23:47.155725 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46b57c trap addr 68370 ([184 202 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:47.155745 30218 usertrap_amd64.go:212] [ 1142: 1143] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.155825 30218 usertrap_amd64.go:122] [ 1142: 1143] Allocate a new trap: 0xc0006d41b0 12 D0712 20:23:47.155852 30218 usertrap_amd64.go:225] [ 1142: 1143] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:47.155869 30218 task_signals.go:470] [ 1142: 1142] Notified of signal 23 D0712 20:23:47.156047 30218 task_signals.go:220] [ 1142: 1142] Signal 23: delivering to handler D0712 20:23:47.163635 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.163665 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 13 D0712 20:23:47.163678 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:47.167436 30218 task_signals.go:470] [ 1142: 1142] Notified of signal 23 D0712 20:23:47.167502 30218 task_signals.go:220] [ 1142: 1142] Signal 23: delivering to handler D0712 20:23:47.174112 30218 usertrap_amd64.go:212] [ 1142: 1142] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.174168 30218 usertrap_amd64.go:122] [ 1142: 1142] Allocate a new trap: 0xc0006d41b0 14 D0712 20:23:47.174185 30218 usertrap_amd64.go:225] [ 1142: 1142] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:47.174243 30218 task_exit.go:204] [ 1142: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.174268 30218 task_exit.go:204] [ 1142: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.174285 30218 task_signals.go:204] [ 1142: 1145] Signal 1142, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.174310 30218 task_exit.go:204] [ 1142: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.174322 30218 task_exit.go:204] [ 1142: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.174359 30218 task_exit.go:204] [ 1142: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.174335 30218 task_signals.go:204] [ 1142: 1143] Signal 1142, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.174375 30218 task_signals.go:204] [ 1142: 1146] Signal 1142, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.174379 30218 task_exit.go:204] [ 1142: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.174392 30218 task_exit.go:204] [ 1142: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.174292 30218 task_signals.go:204] [ 1142: 1144] Signal 1142, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.174398 30218 task_exit.go:204] [ 1142: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.175208 30218 task_exit.go:204] [ 1142: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.175343 30218 task_exit.go:204] [ 1142: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.175358 30218 task_exit.go:204] [ 1142: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.175376 30218 task_exit.go:204] [ 1142: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.176557 30218 task_exit.go:204] [ 1142: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.176587 30218 task_exit.go:204] [ 1142: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.176602 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.176663 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.176741 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.176751 30218 task_exit.go:204] [ 1142: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.177369 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.178663 30218 syscalls.go:262] [ 1147: 1147] Allocating stack with size of 8388608 bytes D0712 20:23:47.178776 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.180205 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.180252 30218 usertrap_amd64.go:106] [ 1147: 1147] Map a usertrap vma at 69000 D0712 20:23:47.180328 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 1 D0712 20:23:47.180348 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:47.180680 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.180705 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 2 D0712 20:23:47.180717 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:47.181370 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.181407 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 3 D0712 20:23:47.181421 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:47.186833 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.186869 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 4 D0712 20:23:47.186882 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:47.187905 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.187997 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 5 D0712 20:23:47.188016 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:47.188072 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.188103 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 6 D0712 20:23:47.188116 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:47.188335 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.188351 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 7 D0712 20:23:47.188357 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:47.188472 30218 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.188502 30218 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000e0a270 8 D0712 20:23:47.188516 30218 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:47.188693 30218 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.188719 30218 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000e0a270 9 D0712 20:23:47.188731 30218 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:47.188890 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.188914 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 10 D0712 20:23:47.188925 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:47.195611 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.195644 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 11 D0712 20:23:47.195656 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:47.199546 30218 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.199566 30218 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000e0a270 12 D0712 20:23:47.199580 30218 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:47.199654 30218 usertrap_amd64.go:212] [ 1147: 1148] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.199699 30218 usertrap_amd64.go:122] [ 1147: 1148] Allocate a new trap: 0xc000e0a270 13 D0712 20:23:47.199715 30218 usertrap_amd64.go:225] [ 1147: 1148] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:47.199753 30218 task_signals.go:470] [ 1147: 1147] Notified of signal 23 D0712 20:23:47.199820 30218 task_signals.go:220] [ 1147: 1147] Signal 23: delivering to handler I0712 20:23:47.204869 30218 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0712 20:23:47.204934 30218 usertrap_amd64.go:212] [ 1147: 1147] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.204991 30218 usertrap_amd64.go:122] [ 1147: 1147] Allocate a new trap: 0xc000e0a270 14 D0712 20:23:47.205003 30218 usertrap_amd64.go:225] [ 1147: 1147] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:47.205054 30218 task_exit.go:204] [ 1147: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.205078 30218 task_exit.go:204] [ 1147: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.205091 30218 task_signals.go:204] [ 1147: 1148] Signal 1147, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.205110 30218 task_exit.go:204] [ 1147: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.205099 30218 task_signals.go:204] [ 1147: 1150] Signal 1147, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.205120 30218 task_exit.go:204] [ 1147: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.205129 30218 task_exit.go:204] [ 1147: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.205108 30218 task_signals.go:204] [ 1147: 1149] Signal 1147, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.205146 30218 task_exit.go:204] [ 1147: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.205164 30218 task_exit.go:204] [ 1147: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.205169 30218 task_exit.go:204] [ 1147: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.205113 30218 task_signals.go:204] [ 1147: 1151] Signal 1147, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.205181 30218 task_exit.go:204] [ 1147: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.205188 30218 task_exit.go:204] [ 1147: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.205195 30218 task_exit.go:204] [ 1147: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.205220 30218 task_exit.go:204] [ 1147: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.206246 30218 task_exit.go:204] [ 1147: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.206304 30218 task_exit.go:204] [ 1147: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.206326 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.206372 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.206499 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.206437 30218 task_exit.go:204] [ 1147: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.207151 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.208407 30218 syscalls.go:262] [ 1152: 1152] Allocating stack with size of 8388608 bytes D0712 20:23:47.208518 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.209875 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.209983 30218 usertrap_amd64.go:106] [ 1152: 1152] Map a usertrap vma at 60000 D0712 20:23:47.210109 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 1 D0712 20:23:47.210137 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:47.210559 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.210582 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 2 D0712 20:23:47.210591 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:47.211083 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.211113 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 3 D0712 20:23:47.211125 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:47.216993 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.217043 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 4 D0712 20:23:47.217059 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:47.218266 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.218297 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 5 D0712 20:23:47.218310 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:47.218487 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.218512 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 6 D0712 20:23:47.218526 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:47.219000 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.219015 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 7 D0712 20:23:47.219025 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:47.219144 30218 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.219166 30218 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc000ac23c0 8 D0712 20:23:47.219177 30218 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:47.219271 30218 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.219283 30218 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc000ac23c0 9 D0712 20:23:47.219290 30218 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:47.219371 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.219394 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 10 D0712 20:23:47.219405 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:47.226660 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.226683 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 11 D0712 20:23:47.226695 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:47.230577 30218 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.230616 30218 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc000ac23c0 12 D0712 20:23:47.230631 30218 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:47.230682 30218 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.230700 30218 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc000ac23c0 13 D0712 20:23:47.230709 30218 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:47.230919 30218 task_signals.go:470] [ 1152: 1152] Notified of signal 23 D0712 20:23:47.231430 30218 task_signals.go:220] [ 1152: 1152] Signal 23: delivering to handler D0712 20:23:47.236714 30218 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.236745 30218 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc000ac23c0 14 D0712 20:23:47.236758 30218 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:47.236823 30218 task_exit.go:204] [ 1152: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.236855 30218 task_exit.go:204] [ 1152: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.236882 30218 task_signals.go:204] [ 1152: 1153] Signal 1152, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.236897 30218 task_exit.go:204] [ 1152: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.236906 30218 task_exit.go:204] [ 1152: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.236924 30218 task_exit.go:204] [ 1152: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.236958 30218 task_signals.go:204] [ 1152: 1154] Signal 1152, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.236979 30218 task_exit.go:204] [ 1152: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.236986 30218 task_exit.go:204] [ 1152: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.236992 30218 task_exit.go:204] [ 1152: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.237007 30218 task_signals.go:204] [ 1152: 1155] Signal 1152, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.237026 30218 task_exit.go:204] [ 1152: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.237038 30218 task_exit.go:204] [ 1152: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.237045 30218 task_exit.go:204] [ 1152: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.237058 30218 task_signals.go:204] [ 1152: 1156] Signal 1152, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.237074 30218 task_exit.go:204] [ 1152: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.238124 30218 task_exit.go:204] [ 1152: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.238149 30218 task_exit.go:204] [ 1152: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.238162 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.238194 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.238202 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.238468 30218 task_exit.go:204] [ 1152: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.239169 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.240558 30218 syscalls.go:262] [ 1157: 1157] Allocating stack with size of 8388608 bytes D0712 20:23:47.240794 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.241551 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.241593 30218 usertrap_amd64.go:106] [ 1157: 1157] Map a usertrap vma at 62000 D0712 20:23:47.241657 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 1 D0712 20:23:47.241683 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:23:47.241979 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.242005 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 2 D0712 20:23:47.242016 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:23:47.242505 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.242528 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 3 D0712 20:23:47.242541 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:23:47.247509 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.247538 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 4 D0712 20:23:47.247548 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:23:47.248555 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.248584 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 5 D0712 20:23:47.248593 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:23:47.248661 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.248669 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 6 D0712 20:23:47.248674 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:23:47.248867 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.248891 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 7 D0712 20:23:47.248897 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:23:47.249135 30218 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.249168 30218 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc0006d4840 8 D0712 20:23:47.249180 30218 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:23:47.249405 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.249425 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 9 D0712 20:23:47.249434 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:23:47.249526 30218 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.249575 30218 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc0006d4840 10 D0712 20:23:47.249593 30218 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:23:47.256860 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.256891 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 11 D0712 20:23:47.256905 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:23:47.259924 30218 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.259955 30218 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc0006d4840 12 D0712 20:23:47.259968 30218 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:23:47.260022 30218 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.260049 30218 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc0006d4840 13 D0712 20:23:47.260058 30218 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:23:47.260093 30218 task_signals.go:470] [ 1157: 1157] Notified of signal 23 D0712 20:23:47.260146 30218 task_signals.go:220] [ 1157: 1157] Signal 23: delivering to handler D0712 20:23:47.267552 30218 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.267616 30218 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc0006d4840 14 D0712 20:23:47.267637 30218 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:23:47.267780 30218 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.267832 30218 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.267840 30218 task_signals.go:204] [ 1157: 1161] Signal 1157, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.267863 30218 task_signals.go:204] [ 1157: 1159] Signal 1157, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.267886 30218 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.267917 30218 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.267925 30218 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.267942 30218 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.267950 30218 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.267956 30218 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.267969 30218 task_signals.go:204] [ 1157: 1160] Signal 1157, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.267980 30218 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.267987 30218 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.267993 30218 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.268004 30218 task_signals.go:204] [ 1157: 1158] Signal 1157, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.268028 30218 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.269470 30218 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.269509 30218 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.269523 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.269672 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.269700 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.269746 30218 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.270274 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.271660 30218 syscalls.go:262] [ 1162: 1162] Allocating stack with size of 8388608 bytes D0712 20:23:47.271906 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.273113 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.273160 30218 usertrap_amd64.go:106] [ 1162: 1162] Map a usertrap vma at 69000 D0712 20:23:47.273243 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 1 D0712 20:23:47.273284 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:23:47.273613 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.273634 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 2 D0712 20:23:47.273645 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:23:47.274270 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.274300 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 3 D0712 20:23:47.274310 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:23:47.281832 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.281960 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 4 D0712 20:23:47.282001 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:23:47.283156 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.283185 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 5 D0712 20:23:47.283198 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:23:47.283257 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.283278 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 6 D0712 20:23:47.283284 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:23:47.283676 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.283697 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 7 D0712 20:23:47.283703 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:23:47.283893 30218 usertrap_amd64.go:212] [ 1162: 1163] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.283921 30218 usertrap_amd64.go:122] [ 1162: 1163] Allocate a new trap: 0xc000ecc3f0 8 D0712 20:23:47.283939 30218 usertrap_amd64.go:225] [ 1162: 1163] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:23:47.284079 30218 usertrap_amd64.go:212] [ 1162: 1163] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.284087 30218 usertrap_amd64.go:122] [ 1162: 1163] Allocate a new trap: 0xc000ecc3f0 9 D0712 20:23:47.284095 30218 usertrap_amd64.go:225] [ 1162: 1163] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:23:47.284216 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.284242 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 10 D0712 20:23:47.284252 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:23:47.292589 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.292622 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 11 D0712 20:23:47.292633 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:23:47.295098 30218 usertrap_amd64.go:212] [ 1162: 1163] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.295132 30218 usertrap_amd64.go:122] [ 1162: 1163] Allocate a new trap: 0xc000ecc3f0 12 D0712 20:23:47.295168 30218 usertrap_amd64.go:225] [ 1162: 1163] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:23:47.295210 30218 usertrap_amd64.go:212] [ 1162: 1163] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.295218 30218 usertrap_amd64.go:122] [ 1162: 1163] Allocate a new trap: 0xc000ecc3f0 13 D0712 20:23:47.295226 30218 usertrap_amd64.go:225] [ 1162: 1163] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:23:47.295266 30218 task_signals.go:470] [ 1162: 1162] Notified of signal 23 D0712 20:23:47.295339 30218 task_signals.go:220] [ 1162: 1162] Signal 23: delivering to handler D0712 20:23:47.302800 30218 usertrap_amd64.go:212] [ 1162: 1162] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.302874 30218 usertrap_amd64.go:122] [ 1162: 1162] Allocate a new trap: 0xc000ecc3f0 14 D0712 20:23:47.302896 30218 usertrap_amd64.go:225] [ 1162: 1162] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:23:47.302950 30218 task_exit.go:204] [ 1162: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.302983 30218 task_exit.go:204] [ 1162: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.302999 30218 task_signals.go:204] [ 1162: 1164] Signal 1162, PID: 1164, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.303016 30218 task_signals.go:204] [ 1162: 1165] Signal 1162, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.303037 30218 task_exit.go:204] [ 1162: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.303078 30218 task_signals.go:204] [ 1162: 1166] Signal 1162, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.303103 30218 task_signals.go:204] [ 1162: 1163] Signal 1162, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.303117 30218 task_exit.go:204] [ 1162: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.303124 30218 task_exit.go:204] [ 1162: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.303139 30218 task_exit.go:204] [ 1162: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.303144 30218 task_exit.go:204] [ 1162: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.303148 30218 task_exit.go:204] [ 1162: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.303155 30218 task_exit.go:204] [ 1162: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.303160 30218 task_exit.go:204] [ 1162: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.303164 30218 task_exit.go:204] [ 1162: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.303174 30218 task_exit.go:204] [ 1162: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.304289 30218 task_exit.go:204] [ 1162: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.304345 30218 task_exit.go:204] [ 1162: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.304366 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.304491 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.304512 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.304623 30218 task_exit.go:204] [ 1162: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.305343 30218 task_stop.go:118] [ 7: 9] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.306897 30218 syscalls.go:262] [ 1167: 1167] Allocating stack with size of 8388608 bytes D0712 20:23:47.307017 30218 task_stop.go:138] [ 7: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.307915 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.307958 30218 usertrap_amd64.go:106] [ 1167: 1167] Map a usertrap vma at 68000 D0712 20:23:47.308039 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 1 D0712 20:23:47.308070 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:23:47.308620 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.308657 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 2 D0712 20:23:47.308674 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:23:47.309251 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.309266 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 3 D0712 20:23:47.309293 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:23:47.314094 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.314124 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 4 D0712 20:23:47.314141 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:23:47.315150 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.315176 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 5 D0712 20:23:47.315196 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:23:47.315256 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.315310 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 6 D0712 20:23:47.315324 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:23:47.315644 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.315669 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 7 D0712 20:23:47.315680 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:23:47.315791 30218 usertrap_amd64.go:212] [ 1167: 1168] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.315813 30218 usertrap_amd64.go:122] [ 1167: 1168] Allocate a new trap: 0xc000ac2870 8 D0712 20:23:47.315823 30218 usertrap_amd64.go:225] [ 1167: 1168] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:23:47.315920 30218 usertrap_amd64.go:212] [ 1167: 1168] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.315933 30218 usertrap_amd64.go:122] [ 1167: 1168] Allocate a new trap: 0xc000ac2870 9 D0712 20:23:47.315938 30218 usertrap_amd64.go:225] [ 1167: 1168] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:23:47.316018 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.316032 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 10 D0712 20:23:47.316038 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:23:47.323379 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.323415 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 11 D0712 20:23:47.323427 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:23:47.326439 30218 usertrap_amd64.go:212] [ 1167: 1168] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.326458 30218 usertrap_amd64.go:122] [ 1167: 1168] Allocate a new trap: 0xc000ac2870 12 D0712 20:23:47.326470 30218 usertrap_amd64.go:225] [ 1167: 1168] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:23:47.326486 30218 usertrap_amd64.go:212] [ 1167: 1168] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.326493 30218 usertrap_amd64.go:122] [ 1167: 1168] Allocate a new trap: 0xc000ac2870 13 D0712 20:23:47.326500 30218 usertrap_amd64.go:225] [ 1167: 1168] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:23:47.326570 30218 task_signals.go:470] [ 1167: 1167] Notified of signal 23 D0712 20:23:47.326695 30218 task_signals.go:220] [ 1167: 1167] Signal 23: delivering to handler D0712 20:23:47.335290 30218 usertrap_amd64.go:212] [ 1167: 1167] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.335330 30218 usertrap_amd64.go:122] [ 1167: 1167] Allocate a new trap: 0xc000ac2870 14 D0712 20:23:47.335345 30218 usertrap_amd64.go:225] [ 1167: 1167] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:23:47.335493 30218 task_exit.go:204] [ 1167: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.335539 30218 task_exit.go:204] [ 1167: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.335602 30218 task_signals.go:204] [ 1167: 1171] Signal 1167, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.335618 30218 task_signals.go:204] [ 1167: 1169] Signal 1167, PID: 1169, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.335603 30218 task_signals.go:204] [ 1167: 1168] Signal 1167, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.335631 30218 task_exit.go:204] [ 1167: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.335641 30218 task_signals.go:204] [ 1167: 1170] Signal 1167, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.335656 30218 task_exit.go:204] [ 1167: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.335662 30218 task_exit.go:204] [ 1167: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.335675 30218 task_exit.go:204] [ 1167: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.335683 30218 task_exit.go:204] [ 1167: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.335693 30218 task_exit.go:204] [ 1167: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.335718 30218 task_exit.go:204] [ 1167: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.335728 30218 task_exit.go:204] [ 1167: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.335735 30218 task_exit.go:204] [ 1167: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.335756 30218 task_exit.go:204] [ 1167: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.336844 30218 task_exit.go:204] [ 1167: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.336879 30218 task_exit.go:204] [ 1167: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.336895 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.336930 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.336979 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.337253 30218 task_exit.go:204] [ 1167: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.338013 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.339289 30218 syscalls.go:262] [ 1172: 1172] Allocating stack with size of 8388608 bytes D0712 20:23:47.339508 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.340855 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.340998 30218 usertrap_amd64.go:106] [ 1172: 1172] Map a usertrap vma at 60000 D0712 20:23:47.341235 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 1 D0712 20:23:47.341293 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:47.341667 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.341693 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 2 D0712 20:23:47.341704 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:47.342294 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.342321 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 3 D0712 20:23:47.342330 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:47.348186 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.348229 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 4 D0712 20:23:47.348246 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:47.349365 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.349396 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 5 D0712 20:23:47.349410 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:47.349655 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.349681 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 6 D0712 20:23:47.349695 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:47.350177 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.350195 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 7 D0712 20:23:47.350205 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:47.350368 30218 usertrap_amd64.go:212] [ 1172: 1173] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.350386 30218 usertrap_amd64.go:122] [ 1172: 1173] Allocate a new trap: 0xc0006d4c90 8 D0712 20:23:47.350397 30218 usertrap_amd64.go:225] [ 1172: 1173] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:47.350595 30218 usertrap_amd64.go:212] [ 1172: 1173] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.350620 30218 usertrap_amd64.go:122] [ 1172: 1173] Allocate a new trap: 0xc0006d4c90 9 D0712 20:23:47.350630 30218 usertrap_amd64.go:225] [ 1172: 1173] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:47.350736 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.350757 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 10 D0712 20:23:47.350765 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:47.357994 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.358021 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 11 D0712 20:23:47.358032 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:47.361194 30218 usertrap_amd64.go:212] [ 1172: 1173] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.361261 30218 usertrap_amd64.go:122] [ 1172: 1173] Allocate a new trap: 0xc0006d4c90 12 D0712 20:23:47.361284 30218 usertrap_amd64.go:225] [ 1172: 1173] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:47.361342 30218 usertrap_amd64.go:212] [ 1172: 1173] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.361416 30218 usertrap_amd64.go:122] [ 1172: 1173] Allocate a new trap: 0xc0006d4c90 13 D0712 20:23:47.361437 30218 usertrap_amd64.go:225] [ 1172: 1173] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:47.361513 30218 task_signals.go:470] [ 1172: 1172] Notified of signal 23 D0712 20:23:47.361634 30218 task_signals.go:220] [ 1172: 1172] Signal 23: delivering to handler D0712 20:23:47.367647 30218 usertrap_amd64.go:212] [ 1172: 1172] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.367689 30218 usertrap_amd64.go:122] [ 1172: 1172] Allocate a new trap: 0xc0006d4c90 14 D0712 20:23:47.367706 30218 usertrap_amd64.go:225] [ 1172: 1172] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:47.367777 30218 task_exit.go:204] [ 1172: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.367834 30218 task_exit.go:204] [ 1172: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.367826 30218 task_signals.go:204] [ 1172: 1176] Signal 1172, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.367860 30218 task_signals.go:204] [ 1172: 1174] Signal 1172, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.367864 30218 task_exit.go:204] [ 1172: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.367830 30218 task_signals.go:204] [ 1172: 1175] Signal 1172, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.367893 30218 task_exit.go:204] [ 1172: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.367905 30218 task_exit.go:204] [ 1172: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.367913 30218 task_exit.go:204] [ 1172: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.367871 30218 task_signals.go:204] [ 1172: 1177] Signal 1172, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.367939 30218 task_exit.go:204] [ 1172: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.367952 30218 task_exit.go:204] [ 1172: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.367957 30218 task_exit.go:204] [ 1172: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.367971 30218 task_signals.go:204] [ 1172: 1173] Signal 1172, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.367982 30218 task_exit.go:204] [ 1172: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.367991 30218 task_exit.go:204] [ 1172: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.367997 30218 task_exit.go:204] [ 1172: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.368006 30218 task_exit.go:204] [ 1172: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.368144 30218 task_exit.go:204] [ 1172: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.368171 30218 task_exit.go:204] [ 1172: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.369336 30218 task_exit.go:204] [ 1172: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.369430 30218 task_exit.go:204] [ 1172: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.369488 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.369575 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.369606 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.369709 30218 task_exit.go:204] [ 1172: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.370536 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.371951 30218 syscalls.go:262] [ 1178: 1178] Allocating stack with size of 8388608 bytes D0712 20:23:47.372095 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.373823 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.373873 30218 usertrap_amd64.go:106] [ 1178: 1178] Map a usertrap vma at 61000 D0712 20:23:47.373991 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 1 D0712 20:23:47.374030 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:47.374428 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.374445 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 2 D0712 20:23:47.374453 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:47.375078 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.375113 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 3 D0712 20:23:47.375130 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:47.381648 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.381687 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 4 D0712 20:23:47.381701 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:47.383201 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.383234 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 5 D0712 20:23:47.383250 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:47.383302 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.383318 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 6 D0712 20:23:47.383325 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:47.383801 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.383885 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 7 D0712 20:23:47.383899 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:47.384078 30218 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.384153 30218 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc001a28660 8 D0712 20:23:47.384214 30218 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:47.384466 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.384505 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 9 D0712 20:23:47.384524 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:47.384555 30218 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.384562 30218 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc001a28660 10 D0712 20:23:47.384569 30218 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:47.385063 30218 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.385076 30218 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc001a28660 11 D0712 20:23:47.385086 30218 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:47.385184 30218 usertrap_amd64.go:212] [ 1178: 1179] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.385193 30218 usertrap_amd64.go:122] [ 1178: 1179] Allocate a new trap: 0xc001a28660 12 D0712 20:23:47.385201 30218 usertrap_amd64.go:225] [ 1178: 1179] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:47.385245 30218 task_signals.go:470] [ 1178: 1178] Notified of signal 23 D0712 20:23:47.385351 30218 task_signals.go:220] [ 1178: 1178] Signal 23: delivering to handler D0712 20:23:47.391892 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.391932 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 13 D0712 20:23:47.391943 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:47.397048 30218 task_signals.go:470] [ 1178: 1178] Notified of signal 23 D0712 20:23:47.398004 30218 task_signals.go:220] [ 1178: 1178] Signal 23: delivering to handler D0712 20:23:47.401744 30218 sys_signal.go:495] [ 1178: 1178] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0712 20:23:47.401853 30218 usertrap_amd64.go:212] [ 1178: 1178] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.401880 30218 usertrap_amd64.go:122] [ 1178: 1178] Allocate a new trap: 0xc001a28660 14 D0712 20:23:47.401895 30218 usertrap_amd64.go:225] [ 1178: 1178] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:47.401961 30218 task_exit.go:204] [ 1178: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.401989 30218 task_exit.go:204] [ 1178: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.401993 30218 task_signals.go:204] [ 1178: 1180] Signal 1178, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.402011 30218 task_signals.go:204] [ 1178: 1181] Signal 1178, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.402022 30218 task_exit.go:204] [ 1178: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.402059 30218 task_exit.go:204] [ 1178: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.402072 30218 task_exit.go:204] [ 1178: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.402084 30218 task_exit.go:204] [ 1178: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.402103 30218 task_exit.go:204] [ 1178: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.402115 30218 task_exit.go:204] [ 1178: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.402127 30218 task_signals.go:204] [ 1178: 1179] Signal 1178, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.402135 30218 task_exit.go:204] [ 1178: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.402140 30218 task_signals.go:204] [ 1178: 1182] Signal 1178, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.402147 30218 task_exit.go:204] [ 1178: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.402151 30218 task_exit.go:204] [ 1178: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.402174 30218 task_exit.go:204] [ 1178: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.403235 30218 task_exit.go:204] [ 1178: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.403266 30218 task_exit.go:204] [ 1178: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.403282 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.403337 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.403363 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.403434 30218 task_exit.go:204] [ 1178: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.404039 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.405484 30218 syscalls.go:262] [ 1183: 1183] Allocating stack with size of 8388608 bytes D0712 20:23:47.405712 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.407212 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.407268 30218 usertrap_amd64.go:106] [ 1183: 1183] Map a usertrap vma at 66000 D0712 20:23:47.407424 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 1 D0712 20:23:47.407467 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:23:47.408703 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.408730 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 2 D0712 20:23:47.408742 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:23:47.409392 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.409424 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 3 D0712 20:23:47.409441 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:23:47.415897 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.415937 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 4 D0712 20:23:47.415950 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:23:47.417793 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.417832 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 5 D0712 20:23:47.417854 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:23:47.418075 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.418106 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 6 D0712 20:23:47.418119 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:23:47.418646 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.418685 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 7 D0712 20:23:47.418699 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:23:47.418943 30218 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.419025 30218 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc0006d4ed0 8 D0712 20:23:47.419043 30218 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:23:47.419278 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.419305 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 9 D0712 20:23:47.419317 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:23:47.419385 30218 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.419404 30218 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc0006d4ed0 10 D0712 20:23:47.419421 30218 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:23:47.426736 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.426804 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 11 D0712 20:23:47.426820 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:23:47.429628 30218 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.429665 30218 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc0006d4ed0 12 D0712 20:23:47.429680 30218 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:23:47.429767 30218 usertrap_amd64.go:212] [ 1183: 1184] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.429788 30218 usertrap_amd64.go:122] [ 1183: 1184] Allocate a new trap: 0xc0006d4ed0 13 D0712 20:23:47.429797 30218 usertrap_amd64.go:225] [ 1183: 1184] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:23:47.429929 30218 task_signals.go:470] [ 1183: 1183] Notified of signal 23 D0712 20:23:47.430063 30218 task_signals.go:220] [ 1183: 1183] Signal 23: delivering to handler D0712 20:23:47.436808 30218 usertrap_amd64.go:212] [ 1183: 1183] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.436841 30218 usertrap_amd64.go:122] [ 1183: 1183] Allocate a new trap: 0xc0006d4ed0 14 D0712 20:23:47.436854 30218 usertrap_amd64.go:225] [ 1183: 1183] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:23:47.436912 30218 task_exit.go:204] [ 1183: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.436987 30218 task_signals.go:204] [ 1183: 1185] Signal 1183, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.436987 30218 task_signals.go:204] [ 1183: 1184] Signal 1183, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.437007 30218 task_signals.go:204] [ 1183: 1186] Signal 1183, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.437028 30218 task_exit.go:204] [ 1183: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.437048 30218 task_signals.go:204] [ 1183: 1187] Signal 1183, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.437067 30218 task_exit.go:204] [ 1183: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.437077 30218 task_exit.go:204] [ 1183: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.437083 30218 task_exit.go:204] [ 1183: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.437105 30218 task_exit.go:204] [ 1183: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.437126 30218 task_exit.go:204] [ 1183: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.437132 30218 task_exit.go:204] [ 1183: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.437142 30218 task_exit.go:204] [ 1183: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.437150 30218 task_exit.go:204] [ 1183: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.437165 30218 task_exit.go:204] [ 1183: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.437176 30218 task_exit.go:204] [ 1183: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.438379 30218 task_exit.go:204] [ 1183: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.438477 30218 task_exit.go:204] [ 1183: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.438495 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.438537 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.438564 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.438642 30218 task_exit.go:204] [ 1183: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.439248 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.440630 30218 syscalls.go:262] [ 1188: 1188] Allocating stack with size of 8388608 bytes D0712 20:23:47.440741 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.443578 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.443622 30218 usertrap_amd64.go:106] [ 1188: 1188] Map a usertrap vma at 63000 D0712 20:23:47.443723 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 1 D0712 20:23:47.443765 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:47.446790 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.446851 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 2 D0712 20:23:47.446870 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:47.447767 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.447797 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 3 D0712 20:23:47.447812 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:47.454110 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.454142 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 4 D0712 20:23:47.454153 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:47.455179 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.455213 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 5 D0712 20:23:47.455226 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:47.455330 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.455350 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 6 D0712 20:23:47.455363 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:47.455865 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.455892 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 7 D0712 20:23:47.455902 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:47.456108 30218 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.456135 30218 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc000ac2a20 8 D0712 20:23:47.456149 30218 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:47.456342 30218 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.456399 30218 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc000ac2a20 9 D0712 20:23:47.456418 30218 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:47.456525 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.456554 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 10 D0712 20:23:47.456565 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:47.465504 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.465551 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 11 D0712 20:23:47.465569 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:47.468570 30218 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.468601 30218 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc000ac2a20 12 D0712 20:23:47.468621 30218 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:47.468645 30218 usertrap_amd64.go:212] [ 1188: 1189] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.468659 30218 usertrap_amd64.go:122] [ 1188: 1189] Allocate a new trap: 0xc000ac2a20 13 D0712 20:23:47.468666 30218 usertrap_amd64.go:225] [ 1188: 1189] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:47.468699 30218 task_signals.go:470] [ 1188: 1188] Notified of signal 23 D0712 20:23:47.468784 30218 task_signals.go:220] [ 1188: 1188] Signal 23: delivering to handler D0712 20:23:47.476509 30218 usertrap_amd64.go:212] [ 1188: 1188] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.476538 30218 usertrap_amd64.go:122] [ 1188: 1188] Allocate a new trap: 0xc000ac2a20 14 D0712 20:23:47.476550 30218 usertrap_amd64.go:225] [ 1188: 1188] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:23:47.476602 30218 task_exit.go:204] [ 1188: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.476633 30218 task_exit.go:204] [ 1188: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.476652 30218 task_signals.go:204] [ 1188: 1189] Signal 1188, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.476664 30218 task_exit.go:204] [ 1188: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.476685 30218 task_signals.go:204] [ 1188: 1191] Signal 1188, PID: 1191, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.476716 30218 task_signals.go:204] [ 1188: 1193] Signal 1188, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.476706 30218 task_signals.go:204] [ 1188: 1192] Signal 1188, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.476733 30218 task_signals.go:204] [ 1188: 1190] Signal 1188, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.476749 30218 task_exit.go:204] [ 1188: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.476814 30218 task_exit.go:204] [ 1188: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.476856 30218 task_exit.go:204] [ 1188: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.476870 30218 task_exit.go:204] [ 1188: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.476876 30218 task_exit.go:204] [ 1188: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.476887 30218 task_exit.go:204] [ 1188: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.476895 30218 task_exit.go:204] [ 1188: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.476912 30218 task_exit.go:204] [ 1188: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.476922 30218 task_exit.go:204] [ 1188: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.476931 30218 task_exit.go:204] [ 1188: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.476936 30218 task_exit.go:204] [ 1188: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.476980 30218 task_exit.go:204] [ 1188: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.478568 30218 task_exit.go:204] [ 1188: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.478593 30218 task_exit.go:204] [ 1188: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.478606 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.479390 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.479436 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.479598 30218 task_exit.go:204] [ 1188: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.480409 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.482082 30218 syscalls.go:262] [ 1194: 1194] Allocating stack with size of 8388608 bytes D0712 20:23:47.482242 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.484724 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.484777 30218 usertrap_amd64.go:106] [ 1194: 1194] Map a usertrap vma at 60000 D0712 20:23:47.484872 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 1 D0712 20:23:47.484906 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:47.485513 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.485542 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 2 D0712 20:23:47.485554 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:47.486182 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.486227 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 3 D0712 20:23:47.486244 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:47.493206 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.493247 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 4 D0712 20:23:47.493263 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:47.494563 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.494593 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 5 D0712 20:23:47.494606 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:47.494734 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.494756 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 6 D0712 20:23:47.494765 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:47.495221 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.495239 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 7 D0712 20:23:47.495248 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:47.495387 30218 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.495397 30218 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc000ac2b70 8 D0712 20:23:47.495405 30218 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:47.495700 30218 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.495755 30218 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc000ac2b70 9 D0712 20:23:47.495770 30218 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:47.495793 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.495800 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 10 D0712 20:23:47.495808 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:47.503607 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.503636 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 11 D0712 20:23:47.503648 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:47.506222 30218 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.506255 30218 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc000ac2b70 12 D0712 20:23:47.506269 30218 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:47.506326 30218 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.506349 30218 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc000ac2b70 13 D0712 20:23:47.506361 30218 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:47.506413 30218 task_signals.go:470] [ 1194: 1194] Notified of signal 23 D0712 20:23:47.506500 30218 task_signals.go:220] [ 1194: 1194] Signal 23: delivering to handler D0712 20:23:47.513602 30218 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.513653 30218 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000ac2b70 14 D0712 20:23:47.513671 30218 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:47.513749 30218 task_exit.go:204] [ 1194: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.513784 30218 task_exit.go:204] [ 1194: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.513805 30218 task_signals.go:204] [ 1194: 1196] Signal 1194, PID: 1196, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.513829 30218 task_signals.go:204] [ 1194: 1195] Signal 1194, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.513840 30218 task_exit.go:204] [ 1194: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.513814 30218 task_signals.go:204] [ 1194: 1197] Signal 1194, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.513860 30218 task_exit.go:204] [ 1194: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.513877 30218 task_exit.go:204] [ 1194: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.513834 30218 task_signals.go:204] [ 1194: 1198] Signal 1194, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.513903 30218 task_exit.go:204] [ 1194: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.513912 30218 task_exit.go:204] [ 1194: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.513930 30218 task_exit.go:204] [ 1194: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.514017 30218 task_exit.go:204] [ 1194: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.514041 30218 task_exit.go:204] [ 1194: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.514058 30218 task_exit.go:204] [ 1194: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.514065 30218 task_exit.go:204] [ 1194: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.515059 30218 task_exit.go:204] [ 1194: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.515095 30218 task_exit.go:204] [ 1194: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.515111 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.515136 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.515152 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.515230 30218 task_exit.go:204] [ 1194: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.515669 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.516711 30218 syscalls.go:262] [ 1199: 1199] Allocating stack with size of 8388608 bytes D0712 20:23:47.516889 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.518356 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.518397 30218 usertrap_amd64.go:106] [ 1199: 1199] Map a usertrap vma at 61000 D0712 20:23:47.518519 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 1 D0712 20:23:47.518549 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:23:47.519046 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.519074 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 2 D0712 20:23:47.519089 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:23:47.519695 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.519722 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 3 D0712 20:23:47.519734 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:23:47.524842 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.524877 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 4 D0712 20:23:47.524891 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:23:47.526060 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.526160 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 5 D0712 20:23:47.526187 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:23:47.526260 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.526272 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 6 D0712 20:23:47.526280 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:23:47.526784 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.526815 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 7 D0712 20:23:47.526828 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:23:47.527002 30218 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.527026 30218 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc000e0aab0 8 D0712 20:23:47.527035 30218 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:23:47.527282 30218 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.527312 30218 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc000e0aab0 9 D0712 20:23:47.527323 30218 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:23:47.527503 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.527533 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 10 D0712 20:23:47.527547 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:23:47.534364 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.534398 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 11 D0712 20:23:47.534410 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:23:47.538066 30218 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.538105 30218 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc000e0aab0 12 D0712 20:23:47.538119 30218 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:23:47.538178 30218 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.538190 30218 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc000e0aab0 13 D0712 20:23:47.538201 30218 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:23:47.538239 30218 task_signals.go:470] [ 1199: 1199] Notified of signal 23 D0712 20:23:47.538316 30218 task_signals.go:220] [ 1199: 1199] Signal 23: delivering to handler D0712 20:23:47.545065 30218 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.545108 30218 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc000e0aab0 14 D0712 20:23:47.545122 30218 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:23:47.545185 30218 task_exit.go:204] [ 1199: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.545210 30218 task_exit.go:204] [ 1199: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.545238 30218 task_signals.go:204] [ 1199: 1203] Signal 1199, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.545249 30218 task_signals.go:204] [ 1199: 1200] Signal 1199, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.545236 30218 task_signals.go:204] [ 1199: 1202] Signal 1199, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.545263 30218 task_exit.go:204] [ 1199: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.545282 30218 task_exit.go:204] [ 1199: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.545288 30218 task_exit.go:204] [ 1199: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.545309 30218 task_exit.go:204] [ 1199: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.545338 30218 task_signals.go:204] [ 1199: 1201] Signal 1199, PID: 1201, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.545351 30218 task_signals.go:204] [ 1199: 1204] Signal 1199, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.545395 30218 task_exit.go:204] [ 1199: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.545405 30218 task_exit.go:204] [ 1199: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.545418 30218 task_exit.go:204] [ 1199: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.545428 30218 task_exit.go:204] [ 1199: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.545433 30218 task_exit.go:204] [ 1199: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.545443 30218 task_exit.go:204] [ 1199: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.545481 30218 task_exit.go:204] [ 1199: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.545490 30218 task_exit.go:204] [ 1199: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.545507 30218 task_exit.go:204] [ 1199: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.549850 30218 task_exit.go:204] [ 1199: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.549890 30218 task_exit.go:204] [ 1199: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.549904 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.549963 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.549986 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.550073 30218 task_exit.go:204] [ 1199: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.550295 30218 task_signals.go:470] [ 7: 14] Notified of signal 23 D0712 20:23:47.550350 30218 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0712 20:23:47.550667 30218 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.551818 30218 syscalls.go:262] [ 1205: 1205] Allocating stack with size of 8388608 bytes D0712 20:23:47.551915 30218 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.553013 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.553054 30218 usertrap_amd64.go:106] [ 1205: 1205] Map a usertrap vma at 6a000 D0712 20:23:47.553150 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 1 D0712 20:23:47.553256 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:23:47.553659 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.553695 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 2 D0712 20:23:47.553712 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:23:47.554411 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.554444 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 3 D0712 20:23:47.554462 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:23:47.560608 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.560644 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 4 D0712 20:23:47.560664 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:23:47.561698 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.561731 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 5 D0712 20:23:47.561742 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:23:47.561778 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.561786 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 6 D0712 20:23:47.561795 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:23:47.562006 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.562034 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 7 D0712 20:23:47.562047 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:23:47.562450 30218 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.562475 30218 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc000ac2f00 8 D0712 20:23:47.562484 30218 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:23:47.562651 30218 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.562675 30218 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc000ac2f00 9 D0712 20:23:47.562685 30218 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:23:47.562727 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.562743 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 10 D0712 20:23:47.562751 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:23:47.572779 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.572805 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 11 D0712 20:23:47.572814 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:23:47.574744 30218 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.574762 30218 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc000ac2f00 12 D0712 20:23:47.574773 30218 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:23:47.574925 30218 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.574982 30218 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc000ac2f00 13 D0712 20:23:47.574994 30218 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:23:47.576424 30218 task_signals.go:470] [ 1205: 1205] Notified of signal 23 D0712 20:23:47.578450 30218 task_signals.go:220] [ 1205: 1205] Signal 23: delivering to handler D0712 20:23:47.578605 30218 task_signals.go:470] [ 1205: 1205] Notified of signal 23 D0712 20:23:47.578649 30218 task_signals.go:220] [ 1205: 1205] Signal 23: delivering to handler D0712 20:23:47.587233 30218 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.587274 30218 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc000ac2f00 14 D0712 20:23:47.587286 30218 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:23:47.587323 30218 task_exit.go:204] [ 1205: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.587340 30218 task_exit.go:204] [ 1205: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.587360 30218 task_signals.go:204] [ 1205: 1207] Signal 1205, PID: 1207, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.587381 30218 task_exit.go:204] [ 1205: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.587388 30218 task_exit.go:204] [ 1205: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.587392 30218 task_exit.go:204] [ 1205: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.587385 30218 task_signals.go:204] [ 1205: 1208] Signal 1205, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.587407 30218 task_exit.go:204] [ 1205: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.587406 30218 task_signals.go:204] [ 1205: 1209] Signal 1205, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.587419 30218 task_exit.go:204] [ 1205: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.587426 30218 task_exit.go:204] [ 1205: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.587375 30218 task_signals.go:204] [ 1205: 1206] Signal 1205, PID: 1206, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.587439 30218 task_exit.go:204] [ 1205: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.587446 30218 task_exit.go:204] [ 1205: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.587473 30218 task_exit.go:204] [ 1205: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.587483 30218 task_exit.go:204] [ 1205: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.588647 30218 task_exit.go:204] [ 1205: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.588697 30218 task_exit.go:204] [ 1205: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.588715 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.588745 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.588778 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.588833 30218 task_exit.go:204] [ 1205: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.589380 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.590611 30218 syscalls.go:262] [ 1210: 1210] Allocating stack with size of 8388608 bytes D0712 20:23:47.590724 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.591736 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.591779 30218 usertrap_amd64.go:106] [ 1210: 1210] Map a usertrap vma at 60000 D0712 20:23:47.591841 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 1 D0712 20:23:47.591865 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:23:47.592230 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.592254 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 2 D0712 20:23:47.592265 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:23:47.592844 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.592868 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 3 D0712 20:23:47.592880 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:23:47.599228 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.599273 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 4 D0712 20:23:47.599287 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:23:47.600310 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.600348 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 5 D0712 20:23:47.600360 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:23:47.600395 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.600407 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 6 D0712 20:23:47.600413 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:23:47.600578 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.600602 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 7 D0712 20:23:47.600609 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:23:47.600838 30218 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.600871 30218 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc000e0ac60 8 D0712 20:23:47.600883 30218 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:23:47.601222 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.601255 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 9 D0712 20:23:47.601270 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:23:47.601289 30218 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.601296 30218 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc000e0ac60 10 D0712 20:23:47.601304 30218 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:23:47.607697 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.607731 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 11 D0712 20:23:47.607743 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:23:47.611691 30218 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.611725 30218 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc000e0ac60 12 D0712 20:23:47.611739 30218 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:23:47.611775 30218 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.611805 30218 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc000e0ac60 13 D0712 20:23:47.611822 30218 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:23:47.611886 30218 task_signals.go:470] [ 1210: 1210] Notified of signal 23 D0712 20:23:47.611962 30218 task_signals.go:220] [ 1210: 1210] Signal 23: delivering to handler D0712 20:23:47.617252 30218 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46ae44:sysno 231 D0712 20:23:47.617282 30218 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc000e0ac60 14 D0712 20:23:47.617292 30218 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:23:47.617353 30218 task_exit.go:204] [ 1210: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.617377 30218 task_exit.go:204] [ 1210: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.617393 30218 task_signals.go:204] [ 1210: 1213] Signal 1210, PID: 1213, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.617392 30218 task_signals.go:204] [ 1210: 1211] Signal 1210, PID: 1211, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.617406 30218 task_exit.go:204] [ 1210: 1213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.617412 30218 task_signals.go:204] [ 1210: 1212] Signal 1210, PID: 1212, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.617446 30218 task_signals.go:204] [ 1210: 1214] Signal 1210, PID: 1214, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.617487 30218 task_signals.go:204] [ 1210: 1215] Signal 1210, PID: 1215, TID: 0, fault addr: 0x9: terminating thread group D0712 20:23:47.617497 30218 task_exit.go:204] [ 1210: 1213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.617518 30218 task_exit.go:204] [ 1210: 1213] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.617532 30218 task_exit.go:204] [ 1210: 1211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.617542 30218 task_exit.go:204] [ 1210: 1211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.617546 30218 task_exit.go:204] [ 1210: 1211] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.617554 30218 task_exit.go:204] [ 1210: 1212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.617560 30218 task_exit.go:204] [ 1210: 1212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.617570 30218 task_exit.go:204] [ 1210: 1212] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.617587 30218 task_exit.go:204] [ 1210: 1214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.617602 30218 task_exit.go:204] [ 1210: 1214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.617615 30218 task_exit.go:204] [ 1210: 1214] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.617628 30218 task_exit.go:204] [ 1210: 1215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:23:47.618736 30218 task_exit.go:204] [ 1210: 1215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:23:47.618760 30218 task_exit.go:204] [ 1210: 1215] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.618775 30218 task_signals.go:470] [ 7: 7] Notified of signal 17 D0712 20:23:47.618796 30218 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0712 20:23:47.618802 30218 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0712 20:23:47.618887 30218 task_exit.go:204] [ 1210: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:23:47.619384 30218 task_stop.go:118] [ 7: 17] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.620648 30218 syscalls.go:262] [ 1216: 1216] Allocating stack with size of 8388608 bytes D0712 20:23:47.620775 30218 task_stop.go:138] [ 7: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:23:47.622109 30218 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b70f:sysno 204 D0712 20:23:47.622157 30218 usertrap_amd64.go:106] [ 1216: 1216] Map a usertrap vma at 63000 D0712 20:23:47.622249 30218 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc000ac3290 1 D0712 20:23:47.622292 30218 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:23:47.622856 30218 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46ae93:sysno 257 D0712 20:23:47.622887 30218 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc000ac3290 2 D0712 20:23:47.622898 30218 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:23:47.623510 30218 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b41d:sysno 9 D0712 20:23:47.623534 30218 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc000ac3290 3 D0712 20:23:47.623541 30218 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:23:47.629149 30218 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b1d3:sysno 14 D0712 20:23:47.629187 30218 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc000ac3290 4 D0712 20:23:47.629200 30218 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:23:47.630514 30218 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46afa0:sysno 186 D0712 20:23:47.630540 30218 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc000ac3290 5 D0712 20:23:47.630549 30218 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:23:47.630599 30218 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b214:sysno 13 D0712 20:23:47.630620 30218 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc000ac3290 6 D0712 20:23:47.630656 30218 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:23:47.631617 30218 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b5eb:sysno 56 D0712 20:23:47.631715 30218 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc000ac3290 7 D0712 20:23:47.631750 30218 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:23:47.632027 30218 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46b60c:sysno 186 D0712 20:23:47.632058 30218 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc000ac3290 8 D0712 20:23:47.632075 30218 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:23:47.632271 30218 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46af76:sysno 35 D0712 20:23:47.632313 30218 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc000ac3290 9 D0712 20:23:47.632327 30218 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:23:47.632354 30218 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b57c:sysno 202 D0712 20:23:47.632363 30218 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc000ac3290 10 D0712 20:23:47.632496 30218 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:23:47.640327 30218 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46af29:sysno 293 D0712 20:23:47.640362 30218 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc000ac3290 11 D0712 20:23:47.640484 30218 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:23:47.642927 30218 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46b020:sysno 39 D0712 20:23:47.642980 30218 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc000ac3290 12 D0712 20:23:47.642994 30218 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:23:47.643035 30218 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46b04f:sysno 234 D0712 20:23:47.643042 30218 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc000ac3290 13 D0712 20:23:47.643048 30218 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:23:47.643065 30218 task_signals.go:470] [ 1216: 1216] Notified of signal 23 D0712 20:23:47.643102 30218 task_signals.go:220] [ 1216: 1216] Signal 23: delivering to handler D0712 20:23:47.649432 30218 task_signals.go:309] [ 1216: 1216] failed to restore from a signal frame: bad address D0712 20:23:47.649486 30218 task_signals.go:470] [ 1216: 1216] Notified of signal 11 D0712 20:23:47.649502 30218 task_signals.go:220] [ 1216: 1216] Signal 11: delivering to handler W0712 20:23:47.684388 30392 util.go:64] FATAL ERROR: waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-test-1": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-test-1": urpc method "containerManager.WaitPID" failed: EOF W0712 20:23:47.684531 30392 main.go:274] Failure to execute command, err: 1 W0712 20:23:47.695070 30136 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-test-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0712 20:23:47.695077 1 connection.go:127] sock read failed, closing connection: EOF I0712 20:23:47.695244 1 gofer.go:319] All lisafs servers exited. I0712 20:23:47.695287 1 main.go:265] Exiting with status: 0 D0712 20:23:47.702719 30136 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-test-1 D0712 20:23:47.702827 30136 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-test-1 D0712 20:23:47.702847 30136 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-test-1 D0712 20:23:47.702856 30136 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-test-1" D0712 20:23:47.702949 30136 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-test-1, PID: 30211 D0712 20:23:47.708145 30136 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-test-1" D0712 20:23:47.708253 30136 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708448 30136 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708622 30136 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708648 30136 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708655 30136 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708662 30136 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708671 30136 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708677 30136 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708684 30136 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708694 30136 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708705 30136 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708710 30136 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-test-1" D0712 20:23:47.708716 30136 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-test-1" I0712 20:23:47.709652 30136 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0712 20:23:47.817284 30666 main.go:230] *************************** I0712 20:23:47.817340 30666 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-1] I0712 20:23:47.817365 30666 main.go:232] Version 0.0.0 I0712 20:23:47.817377 30666 main.go:233] GOOS: linux I0712 20:23:47.817389 30666 main.go:234] GOARCH: amd64 I0712 20:23:47.817402 30666 main.go:235] PID: 30666 I0712 20:23:47.817415 30666 main.go:236] UID: 0, GID: 0 I0712 20:23:47.817428 30666 main.go:237] Configuration: I0712 20:23:47.817441 30666 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0712 20:23:47.817453 30666 main.go:239] Platform: systrap I0712 20:23:47.817479 30666 main.go:240] FileAccess: shared I0712 20:23:47.817494 30666 main.go:241] Directfs: true I0712 20:23:47.817519 30666 main.go:242] Overlay: none I0712 20:23:47.817532 30666 main.go:243] Network: sandbox, logging: false I0712 20:23:47.817547 30666 main.go:244] Strace: false, max size: 1024, syscalls: I0712 20:23:47.817560 30666 main.go:245] IOURING: false I0712 20:23:47.817574 30666 main.go:246] Debug: true I0712 20:23:47.817586 30666 main.go:247] Systemd: false I0712 20:23:47.817599 30666 main.go:248] *************************** D0712 20:23:47.817652 30666 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 20:23:47.817746 30666 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-1": file does not exist loading container "ci-gvisor-systrap-1-test-1": file does not exist W0712 20:23:47.817802 30666 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-test-1"]: exit status 128 I0712 20:23:47.817284 30666 main.go:230] *************************** I0712 20:23:47.817340 30666 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-1] I0712 20:23:47.817365 30666 main.go:232] Version 0.0.0 I0712 20:23:47.817377 30666 main.go:233] GOOS: linux I0712 20:23:47.817389 30666 main.go:234] GOARCH: amd64 I0712 20:23:47.817402 30666 main.go:235] PID: 30666 I0712 20:23:47.817415 30666 main.go:236] UID: 0, GID: 0 I0712 20:23:47.817428 30666 main.go:237] Configuration: I0712 20:23:47.817441 30666 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0712 20:23:47.817453 30666 main.go:239] Platform: systrap I0712 20:23:47.817479 30666 main.go:240] FileAccess: shared I0712 20:23:47.817494 30666 main.go:241] Directfs: true I0712 20:23:47.817519 30666 main.go:242] Overlay: none I0712 20:23:47.817532 30666 main.go:243] Network: sandbox, logging: false I0712 20:23:47.817547 30666 main.go:244] Strace: false, max size: 1024, syscalls: I0712 20:23:47.817560 30666 main.go:245] IOURING: false I0712 20:23:47.817574 30666 main.go:246] Debug: true I0712 20:23:47.817586 30666 main.go:247] Systemd: false I0712 20:23:47.817599 30666 main.go:248] *************************** D0712 20:23:47.817652 30666 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 20:23:47.817746 30666 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-1": file does not exist loading container "ci-gvisor-systrap-1-test-1": file does not exist W0712 20:23:47.817802 30666 main.go:274] Failure to execute command, err: 1 [11501068.657800] [ 681897] 0 681897 4533 18 81920 0 0 exe [11501068.666281] [ 681896] 0 681896 4151 21 36864 0 0 exe [11501068.674841] [ 681898] 0 681898 4151 21 36864 0 0 exe [11501068.683397] [ 681899] 0 681899 4151 21 36864 0 0 exe [11501068.691861] [ 681900] 0 681900 4139 19 36864 0 0 exe [11501068.700327] [ 681901] 0 681901 4133 18 36864 0 0 exe [11501068.708820] [ 681902] 0 681902 4133 18 36864 0 0 exe [11501068.717378] [ 681903] 0 681903 4151 21 36864 0 0 exe [11501068.725859] [ 681904] 0 681904 4533 18 81920 0 0 exe [11501068.734324] [ 681905] 0 681905 4139 19 36864 0 0 exe [11501068.742785] [ 681906] 0 681906 4151 21 36864 0 0 exe [11501068.751381] [ 681907] 0 681907 4151 21 36864 0 0 exe [11501068.759863] [ 681908] 0 681908 4151 21 36864 0 0 exe [11501068.768326] [ 681909] 0 681909 4133 18 36864 0 0 exe [11501068.776877] [ 681910] 0 681910 4133 18 36864 0 0 exe [11501068.785357] [ 681911] 0 681911 4133 18 36864 0 0 exe [11501068.793867] [ 681912] 0 681912 4145 20 36864 0 0 exe [11501068.802337] [ 681913] 0 681913 4133 18 36864 0 0 exe [11501068.810805] [ 681914] 0 681914 4151 21 36864 0 0 exe [11501068.819284] [ 681915] 0 681915 4139 18 36864 0 0 exe [11501068.827752] [ 681917] 0 681917 4151 21 36864 0 0 exe [11501068.836301] [ 681916] 0 681916 4151 21 36864 0 0 exe [11501068.844768] [ 681919] 0 681919 4545 21 81920 0 0 exe [11501068.853246] [ 681918] 0 681918 4145 20 36864 0 0 exe [11501068.861722] [ 681920] 0 681920 4151 21 36864 0 0 exe [11501068.870191] [ 681921] 0 681921 4151 21 36864 0 0 exe [11501068.878668] [ 681922] 0 681922 4139 18 36864 0 0 exe [11501068.887157] [ 681923] 0 681923 4545 21 81920 0 0 exe [11501068.895634] [ 681924] 0 681924 4151 21 36864 0 0 exe [11501068.904106] [ 681929] 0 681929 4151 21 36864 0 0 exe [11501068.912577] [ 681935] 0 681935 4151 21 36864 0 0 exe [11501068.921056] [ 682708] 0 682708 4157 22 28672 0 0 exe [11501068.929610] [ 682717] 0 682717 4157 22 28672 0 0 exe [11501068.938077] [ 682721] 0 682721 4157 22 28672 0 0 exe [11501068.946544] [ 682800] 0 682800 4151 21 36864 0 0 exe [11501068.955023] [ 682802] 0 682802 4151 21 36864 0 0 exe [11501068.963490] [ 682806] 0 682806 4151 21 36864 0 0 exe [11501068.971987] [ 683096] 0 683096 4151 21 28672 0 0 exe [11501068.980647] [ 683097] 0 683097 4151 21 28672 0 0 exe [11501068.989118] [ 683098] 0 683098 4151 21 28672 0 0 exe [11501068.997593] [ 683099] 0 683099 4151 21 28672 0 0 exe [11501069.006074] [ 683122] 0 683122 4151 21 28672 0 0 exe [11501069.014628] [ 683140] 0 683140 4479 20 69632 0 0 exe [11501069.023094] [ 683141] 0 683141 4479 20 69632 0 0 exe [11501069.031564] [ 683142] 0 683142 4151 21 28672 0 0 exe [11501069.040031] [ 683186] 0 683186 4151 21 28672 0 0 exe [11501069.048508] [ 683420] 0 683420 4563 20 73728 0 0 exe [11501069.056977] [ 683428] 0 683428 4151 21 28672 0 0 exe [11501069.065441] [ 683558] 0 683558 1 1 12288 0 0 exe [11501069.073910] [ 683569] 0 683569 1 1 12288 0 0 exe [11501069.082821] [ 683693] 0 683693 1 1 12288 0 0 exe [11501069.091302] [ 683750] 0 683750 1 1 12288 0 0 exe [11501069.099770] [ 683770] 0 683770 1 1 12288 0 0 exe [11501069.108250] [ 683792] 0 683792 1 1 12288 0 0 exe [11501069.116731] [ 683809] 0 683809 1 1 12288 0 0 exe [11501069.125206] [ 683813] 0 683813 1 1 12288 0 0 exe [11501069.133686] [ 684085] 0 684085 4533 18 81920 0 0 exe [11501069.142329] [ 684091] 0 684091 4145 20 36864 0 0 exe [11501069.150800] [ 684310] 65534 684310 1 1 12288 0 0 exe [11501069.159268] [ 684316] 65534 684316 1 1 12288 0 0 exe [11501069.167734] [ 684345] 0 684345 4145 20 36864 0 0 exe [11501069.176201] [ 684536] 0 684536 1 1 12288 0 0 exe [11501069.184685] [ 684547] 0 684547 1 1 12288 0 0 exe [11501069.193205] [ 684560] 0 684560 1 1 12288 0 0 exe [11501069.201676] [ 684610] 0 684610 1 1 12288 0 0 exe [11501069.210157] [ 684654] 0 684654 1 1 12288 0 0 exe [11501069.218627] [ 684686] 0 684686 1 1 12288 0 0 exe [11501069.227098] [ 684711] 0 684711 1 1 12288 0 0 exe [11501069.235566] [ 684731] 0 684731 1 1 12288 0 0 exe [11501069.244045] [ 684763] 0 684763 1 1 12288 0 0 exe [11501069.252518] [ 684779] 0 684779 1 1 12288 0 0 exe [11501069.260995] [ 684797] 0 684797 1 1 12288 0 0 exe [11501069.269466] [ 684811] 0 684811 1 1 12288 0 0 exe [11501069.278029] [ 684848] 0 684848 1 1 12288 0 0 exe [11501069.286498] [ 684854] 0 684854 1 1 12288 0 0 exe [11501069.295057] [ 684876] 0 684876 1 1 12288 0 0 exe [11501069.303532] [ 684880] 0 684880 1 1 12288 0 0 exe [11501069.311999] [ 687179] 0 687179 4157 22 28672 0 0 exe [11501069.320479] [ 687213] 0 687213 4157 22 28672 0 0 exe [11501069.330008] [ 687234] 0 687234 105692 71130 790528 0 0 exe [11501069.338535] [ 687235] 0 687235 105692 71130 790528 0 0 exe [11501069.347016] [ 687447] 0 687447 4139 19 36864 0 0 exe [11501069.355504] [ 687455] 0 687455 4151 21 36864 0 0 exe [11501069.363971] [ 687485] 0 687485 4151 21 36864 0 0 exe [11501069.372521] [ 687780] 65534 687780 1 1 12288 0 0 exe [11501069.380987] [ 687784] 65534 687784 1 1 12288 0 0 exe [11501069.389552] [ 687879] 0 687879 4151 21 36864 0 0 exe [11501069.398133] [ 688264] 0 688264 4633 20 73728 0 0 exe [11501069.406600] [ 688268] 0 688268 4633 20 73728 0 0 exe [11501069.415081] [ 688280] 0 688280 4633 20 73728 0 0 exe [11501069.423549] [ 688286] 0 688286 4151 21 36864 0 0 exe [11501069.432115] [ 688666] 0 688666 4151 21 36864 0 0 exe [11501069.440586] [ 688720] 0 688720 1 1 12288 0 0 exe [11501069.449057] [ 688728] 0 688728 1 1 12288 0 0 exe [11501069.457520] [ 688738] 0 688738 1 1 12288 0 0 exe [11501069.465982] [ 688747] 0 688747 1 1 12288 0 0 exe [11501069.474445] [ 688816] 0 688816 1 1 12288 0 0 exe [11501069.482907] [ 688834] 0 688834 4151 21 36864 0 0 exe [11501069.491371] [ 688875] 0 688875 1 1 12288 0 0 exe [11501069.499928] [ 688889] 0 688889 1 1 12288 0 0 exe [11501069.508487] [ 688907] 0 688907 1 1 12288 0 0 exe [11501069.516951] [ 688929] 0 688929 1 1 12288 0 0 exe [11501069.525432] [ 688933] 0 688933 1 1 12288 0 0 exe [11501069.533897] [ 688960] 0 688960 1 1 12288 0 0 exe [11501069.542378] [ 688966] 0 688966 1 1 12288 0 0 exe [11501069.550862] [ 688981] 0 688981 1 1 12288 0 0 exe [11501069.559327] [ 688990] 0 688990 1 1 12288 0 0 exe [11501069.567887] [ 689013] 0 689013 1 1 12288 0 0 exe [11501069.576354] [ 689032] 0 689032 1 1 12288 0 0 exe [11501069.584817] [ 689057] 0 689057 1 1 12288 0 0 exe [11501069.593384] [ 689103] 0 689103 1 1 12288 0 0 exe [11501069.601859] [ 689137] 0 689137 1 1 12288 0 0 exe [11501069.610332] [ 689177] 0 689177 1 1 12288 0 0 exe [11501069.618895] [ 689211] 0 689211 1 1 12288 0 0 exe [11501069.627359] [ 689369] 0 689369 1 1 12288 0 0 exe [11501069.635820] [ 689397] 0 689397 1 1 12288 0 0 exe [11501069.644320] [ 689413] 0 689413 1 1 12288 0 0 exe [11501069.652902] [ 689503] 0 689503 4151 21 36864 0 0 exe [11501069.661388] [ 690218] 0 690218 4151 21 28672 0 0 exe [11501069.669856] [ 690765] 0 690765 4163 23 28672 0 0 exe [11501069.678409] [ 690816] 0 690816 4151 21 28672 0 0 exe [11501069.686872] [ 690926] 0 690926 4151 21 36864 0 0 exe [11501069.695339] [ 691256] 0 691256 4157 22 28672 0 0 exe [11501069.703888] [ 691546] 65534 691546 1 1 12288 0 0 exe [11501069.712350] [ 691604] 0 691604 4145 20 36864 0 0 exe [11501069.720814] [ 691616] 0 691616 4145 20 36864 0 0 exe [11501069.729371] [ 691639] 0 691639 4151 21 36864 0 0 exe [11501069.737863] [ 691642] 0 691642 4145 20 36864 0 0 exe [11501069.746328] [ 691670] 0 691670 4545 21 81920 0 0 exe [11501069.754793] [ 691671] 0 691671 4545 21 81920 0 0 exe [11501069.763255] [ 691674] 0 691674 4545 21 81920 0 0 exe [11501069.771801] [ 691682] 0 691682 4145 20 36864 0 0 exe [11501069.780260] [ 691683] 0 691683 4145 20 36864 0 0 exe [11501069.788721] [ 691686] 0 691686 4545 21 81920 0 0 exe [11501069.797195] [ 691687] 0 691687 4545 21 81920 0 0 exe [11501069.805657] [ 691688] 0 691688 4545 21 81920 0 0 exe [11501069.814121] [ 691689] 0 691689 4151 21 36864 0 0 exe [11501069.822583] [ 691692] 0 691692 4151 21 36864 0 0 exe [11501069.831047] [ 691789] 0 691789 4633 20 73728 0 0 exe [11501069.839505] [ 691906] 0 691906 1 1 12288 0 0 exe [11501069.847968] [ 691910] 0 691910 1 1 12288 0 0 exe [11501069.856432] [ 691915] 0 691915 1 1 12288 0 0 exe [11501069.864899] [ 691921] 0 691921 1 1 12288 0 0 exe [11501069.873458] [ 691925] 0 691925 1 1 12288 0 0 exe [11501069.882007] [ 691929] 0 691929 1 1 12288 0 0 exe [11501069.890477] [ 691933] 0 691933 1 1 12288 0 0 exe [11501069.898938] [ 691938] 0 691938 1 1 12288 0 0 exe [11501069.907399] [ 691939] 0 691939 1 1 12288 0 0 exe [11501069.915860] [ 691945] 0 691945 1 1 12288 0 0 exe [11501069.924320] [ 691949] 0 691949 1 1 12288 0 0 exe [11501069.932782] [ 691953] 0 691953 1 1 12288 0 0 exe [11501069.941255] [ 692030] 0 692030 4151 21 28672 0 0 exe [11501069.949717] [ 692031] 0 692031 4151 21 28672 0 0 exe [11501069.958269] [ 692089] 0 692089 4151 21 28672 0 0 exe [11501069.966733] [ 692518] 0 692518 4151 21 28672 0 0 exe [11501069.975206] [ 692519] 0 692519 4151 21 28672 0 0 exe [11501069.983673] [ 692529] 0 692529 4151 21 28672 0 0 exe [11501069.992226] [ 692586] 0 692586 4139 19 28672 0 0 exe [11501070.000700] [ 692594] 0 692594 4151 21 28672 0 0 exe [11501070.009169] [ 692609] 0 692609 4151 21 28672 0 0 exe [11501070.017715] [ 692651] 0 692651 1 1 12288 0 0 exe [11501070.026175] [ 692657] 0 692657 1 1 12288 0 0 exe [11501070.034643] [ 692661] 0 692661 1 1 12288 0 0 exe [11501070.043111] [ 692665] 0 692665 1 1 12288 0 0 exe [11501070.051577] [ 692739] 0 692739 1 1 12288 0 0 exe [11501070.060047] [ 692800] 0 692800 4151 21 28672 0 0 exe [11501070.068521] [ 692819] 0 692819 4151 21 28672 0 0 exe [11501070.076986] [ 692820] 0 692820 4151 21 28672 0 0 exe [11501070.085554] [ 692826] 0 692826 103587 69076 823296 0 0 exe [11501070.094027] [ 692827] 0 692827 103587 69076 823296 0 0 exe [11501070.102499] [ 692835] 0 692835 4175 25 28672 0 0 exe [11501070.110957] [ 692836] 0 692836 4175 25 28672 0 0 exe [11501070.119418] [ 692837] 0 692837 4175 25 28672 0 0 exe [11501070.127879] [ 692859] 0 692859 4145 20 28672 0 0 exe [11501070.136339] [ 692952] 0 692952 4549 21 57344 0 0 exe [11501070.144801] [ 692956] 0 692956 4549 21 57344 0 0 exe [11501070.153358] [ 692957] 0 692957 4157 22 28672 0 0 exe [11501070.161905] [ 692982] 0 692982 4414 23 53248 0 0 exe [11501070.170451] [ 692983] 0 692983 4414 23 53248 0 0 exe [11501070.178911] [ 692984] 0 692984 4302 22 73728 0 0 exe [11501070.187397] [ 692985] 0 692985 4302 22 73728 0 0 exe [11501070.195870] [ 692986] 0 692986 4786 20 86016 0 0 exe [11501070.204330] [ 692987] 0 692987 4786 20 86016 0 0 exe [11501070.212793] [ 692988] 0 692988 4490 21 77824 0 0 exe [11501070.221440] [ 692989] 0 692989 4490 21 77824 0 0 exe [11501070.229902] [ 692990] 0 692990 4404 21 69632 0 0 exe [11501070.238452] [ 692991] 0 692991 4404 21 69632 0 0 exe [11501070.246910] [ 692992] 0 692992 4151 21 28672 0 0 exe [11501070.255372] [ 692993] 0 692993 4151 21 28672 0 0 exe [11501070.263924] [ 692994] 0 692994 4404 21 69632 0 0 exe [11501070.272386] [ 692995] 0 692995 4404 21 69632 0 0 exe [11501070.280850] [ 692996] 0 692996 4404 21 69632 0 0 exe [11501070.289316] [ 692997] 0 692997 4145 18 28672 0 0 exe [11501070.297862] [ 692998] 0 692998 4145 18 28672 0 0 exe [11501070.306341] [ 692999] 0 692999 4543 20 57344 0 0 exe [11501070.314803] [ 693000] 0 693000 4543 20 57344 0 0 exe [11501070.323361] [ 693001] 0 693001 4543 20 57344 0 0 exe [11501070.331819] [ 693002] 0 693002 4543 20 57344 0 0 exe [11501070.340278] [ 693004] 0 693004 4786 20 86016 0 0 exe [11501070.348739] [ 693005] 0 693005 4414 23 53248 0 0 exe [11501070.357208] [ 693006] 0 693006 4302 22 73728 0 0 exe [11501070.365673] [ 693007] 0 693007 6284 21 94208 0 0 exe [11501070.374225] [ 693008] 0 693008 4145 18 28672 0 0 exe [11501070.382683] [ 693009] 0 693009 4145 18 28672 0 0 exe [11501070.391145] [ 693010] 0 693010 4145 20 28672 0 0 exe [11501070.399699] [ 693012] 0 693012 4145 20 28672 0 0 exe [11501070.408165] [ 693013] 0 693013 4302 22 73728 0 0 exe [11501070.416628] [ 693014] 0 693014 4410 22 69632 0 0 exe [11501070.425142] [ 693015] 0 693015 4410 22 69632 0 0 exe [11501070.433626] [ 693016] 0 693016 4295 21 49152 0 0 exe [11501070.442090] [ 693017] 0 693017 4295 21 49152 0 0 exe [11501070.450552] [ 693018] 0 693018 4549 21 57344 0 0 exe [11501070.459013] [ 693019] 0 693019 4549 21 57344 0 0 exe [11501070.467474] [ 693037] 0 693037 4151 21 28672 0 0 exe [11501070.475936] [ 693052] 0 693052 4549 21 57344 0 0 exe [11501070.484404] [ 693055] 0 693055 4295 21 49152 0 0 exe [11501070.492963] [ 693057] 0 693057 4404 21 69632 0 0 exe [11501070.501426] [ 693064] 0 693064 4295 21 49152 0 0 exe [11501070.509893] [ 693070] 0 693070 4157 22 28672 0 0 exe [11501070.518366] [ 693085] 0 693085 4295 21 49152 0 0 exe [11501070.526839] [ 693144] 0 693144 4549 21 57344 0 0 exe [11501070.535319] [ 693148] 0 693148 4404 21 69632 0 0 exe [11501070.543795] [ 693150] 0 693150 4404 21 69632 0 0 exe [11501070.552257] [ 693157] 0 693157 4151 21 36864 0 0 exe [11501070.560804] [ 693160] 0 693160 4151 21 36864 0 0 exe [11501070.569350] [ 693169] 0 693169 4169 24 28672 0 0 exe [11501070.577810] [ 693170] 0 693170 4151 21 36864 0 0 exe [11501070.586272] [ 693212] 0 693212 4549 20 73728 0 0 exe [11501070.594911] [ 693224] 0 693224 4145 20 28672 0 0 exe [11501070.603375] [ 693225] 0 693225 4145 20 28672 0 0 exe [11501070.611839] [ 693265] 0 693265 4549 21 57344 0 0 exe [11501070.620303] [ 693323] 0 693323 4157 22 28672 0 0 exe [11501070.628774] [ 693369] 0 693369 4151 21 36864 0 0 exe [11501070.637247] [ 693375] 0 693375 4151 21 36864 0 0 exe [11501070.645718] [ 693378] 0 693378 4151 21 36864 0 0 exe [11501070.654268] [ 693380] 0 693380 4151 21 36864 0 0 exe [11501070.662728] [ 693441] 0 693441 4157 22 28672 0 0 exe [11501070.671193] [ 693443] 0 693443 4151 21 28672 0 0 exe [11501070.679746] [ 693444] 0 693444 4157 22 28672 0 0 exe [11501070.688211] [ 693466] 0 693466 452103 9171 434176 0 0 image [11501070.696864] [ 693493] 0 693493 396484 9047 405504 0 0 exe [11501070.705343] [ 693496] 0 693496 1509223 108390 2351104 0 0 exe [11501070.713895] [ 693575] 0 693575 4151 21 36864 0 0 exe [11501070.722449] [ 693584] 0 693584 4410 22 69632 0 0 exe [11501070.730916] [ 693585] 0 693585 1 0 12288 0 0 exe [11501070.739381] [ 693607] 0 693607 28370 3144 237568 0 0 exe [11501070.747848] [ 693630] 0 693630 4151 21 36864 0 0 exe [11501070.756411] [ 693644] 0 693644 4133 16 28672 0 0 exe [11501070.764876] [ 693645] 0 693645 4133 16 28672 0 0 exe [11501070.773348] [ 693646] 0 693646 4133 16 28672 0 0 exe [11501070.781813] [ 693647] 0 693647 4133 16 28672 0 0 exe [11501070.790294] [ 693648] 0 693648 4133 16 28672 0 0 exe [11501070.798755] [ 693649] 0 693649 4133 16 28672 0 0 exe [11501070.807222] [ 693650] 0 693650 4133 16 28672 0 0 exe [11501070.815691] [ 693651] 0 693651 4133 16 28672 0 0 exe [11501070.824168] [ 693652] 0 693652 4145 18 28672 0 0 exe [11501070.832635] [ 693653] 0 693653 4145 18 28672 0 0 exe [11501070.841131] [ 693654] 0 693654 4133 16 28672 0 0 exe [11501070.849597] [ 693655] 0 693655 4133 16 28672 0 0 exe [11501070.858061] [ 693656] 0 693656 4133 16 28672 0 0 exe [11501070.866526] [ 693657] 0 693657 4133 16 28672 0 0 exe [11501070.874992] [ 693658] 0 693658 4133 16 28672 0 0 exe [11501070.883459] [ 693661] 0 693661 4133 16 28672 0 0 exe [11501070.891930] [ 693662] 0 693662 4133 16 28672 0 0 exe [11501070.900394] [ 693666] 0 693666 4133 16 28672 0 0 exe [11501070.908857] [ 693668] 0 693668 4151 18 28672 0 0 exe [11501070.917332] [ 693669] 0 693669 4133 16 28672 0 0 exe [11501070.925792] [ 693670] 0 693670 4157 22 28672 0 0 exe [11501070.934254] [ 693671] 0 693671 4151 18 28672 0 0 exe [11501070.942718] [ 693672] 0 693672 4151 18 28672 0 0 exe [11501070.951183] [ 693673] 0 693673 4133 16 28672 0 0 exe [11501070.959659] [ 693674] 0 693674 4133 16 28672 0 0 exe [11501070.968121] [ 693675] 0 693675 4157 22 28672 0 0 exe [11501070.976581] [ 693676] 0 693676 4175 25 28672 0 0 exe [11501070.985043] [ 693677] 0 693677 4133 16 28672 0 0 exe [11501070.993516] [ 693678] 0 693678 4133 16 28672 0 0 exe [11501071.001979] [ 693679] 0 693679 4133 16 28672 0 0 exe [11501071.010437] [ 693680] 0 693680 4133 16 28672 0 0 exe [11501071.018900] [ 693681] 0 693681 4133 16 28672 0 0 exe [11501071.027363] [ 693682] 0 693682 4133 16 28672 0 0 exe [11501071.035826] [ 693683] 0 693683 4133 16 28672 0 0 exe [11501071.044288] [ 693684] 0 693684 4133 16 28672 0 0 exe [11501071.052750] [ 693685] 0 693685 4133 16 28672 0 0 exe [11501071.061226] [ 693686] 0 693686 4163 23 28672 0 0 exe [11501071.069690] [ 693687] 0 693687 4175 25 28672 0 0 exe [11501071.078152] [ 693688] 0 693688 4163 23 28672 0 0 exe [11501071.086703] [ 693689] 0 693689 4133 16 28672 0 0 exe [11501071.095164] [ 693690] 0 693690 4133 16 28672 0 0 exe [11501071.103625] [ 693691] 0 693691 4133 16 28672 0 0 exe [11501071.112100] [ 693692] 0 693692 4163 23 28672 0 0 exe [11501071.120565] [ 693693] 0 693693 4139 18 28672 0 0 exe [11501071.129031] [ 693694] 0 693694 4133 16 28672 0 0 exe [11501071.137582] [ 693695] 0 693695 4163 23 28672 0 0 exe [11501071.146047] [ 693696] 0 693696 4139 18 28672 0 0 exe [11501071.154505] [ 693697] 0 693697 4133 16 28672 0 0 exe [11501071.162970] [ 693698] 0 693698 6285 23 94208 0 0 exe [11501071.171432] [ 693699] 0 693699 4163 23 28672 0 0 exe [11501071.179895] [ 693700] 0 693700 6285 23 94208 0 0 exe [11501071.188451] [ 693701] 0 693701 4133 16 28672 0 0 exe [11501071.196914] [ 693702] 0 693702 4133 16 28672 0 0 exe [11501071.205385] [ 693703] 0 693703 4163 23 28672 0 0 exe [11501071.213847] [ 693704] 0 693704 4163 23 28672 0 0 exe [11501071.222311] [ 693705] 0 693705 4133 16 28672 0 0 exe [11501071.230773] [ 693706] 0 693706 4139 18 28672 0 0 exe [11501071.239235] [ 693707] 0 693707 4157 22 28672 0 0 exe [11501071.247696] [ 693708] 0 693708 4151 19 28672 0 0 exe [11501071.256161] [ 693709] 0 693709 4163 23 28672 0 0 exe [11501071.264630] [ 693711] 0 693711 4151 19 28672 0 0 exe [11501071.273120] [ 693712] 0 693712 4157 22 28672 0 0 exe [11501071.281673] [ 693713] 0 693713 4145 18 28672 0 0 exe [11501071.290134] [ 693714] 0 693714 4145 18 28672 0 0 exe [11501071.298681] [ 693722] 0 693722 4175 25 28672 0 0 exe [11501071.307231] [ 693730] 0 693730 4490 23 69632 0 0 exe [11501071.315775] [ 693732] 0 693732 4175 25 28672 0 0 exe [11501071.324236] [ 693731] 0 693731 4163 23 28672 0 0 exe [11501071.332700] [ 693733] 0 693733 6285 23 94208 0 0 exe [11501071.341181] [ 693734] 0 693734 4163 23 28672 0 0 exe [11501071.349652] [ 693735] 0 693735 4175 25 28672 0 0 exe [11501071.358124] [ 693738] 0 693738 6285 23 94208 0 0 exe [11501071.366591] [ 693749] 0 693749 4163 23 28672 0 0 exe [11501071.375070] [ 693764] 0 693764 4410 22 69632 0 0 exe [11501071.384230] [ 693798] 65534 693798 1 1 12288 0 0 exe [11501071.392714] [ 693800] 65534 693800 1 1 12288 0 0 exe [11501071.401195] [ 693807] 65534 693807 1 1 12288 0 0 exe [11501071.409676] [ 693808] 65534 693808 1 1 12288 0 0 exe [11501071.418166] [ 693812] 65534 693812 1 1 12288 0 0 exe [11501071.426648] [ 693814] 65534 693814 491 1 45056 0 0 exe [11501071.435135] [ 693915] 0 693915 4490 23 69632 0 0 exe [11501071.443611] [ 693916] 0 693916 4490 23 69632 0 0 exe [11501071.452102] [ 693935] 0 693935 6285 23 94208 0 0 exe [11501071.460585] [ 693936] 0 693936 4157 22 28672 0 0 exe [11501071.469066] [ 693943] 0 693943 4157 22 28672 0 0 exe [11501071.477541] [ 693945] 0 693945 4157 22 28672 0 0 exe [11501071.486017] [ 693949] 0 693949 4157 22 28672 0 0 exe [11501071.494495] [ 693962] 0 693962 6285 23 94208 0 0 exe [11501071.502968] [ 694010] 0 694010 4175 25 28672 0 0 exe [11501071.511448] [ 694015] 0 694015 6285 23 94208 0 0 exe [11501071.519932] [ 694020] 0 694020 4157 22 28672 0 0 exe [11501071.528409] [ 694021] 0 694021 4145 18 28672 0 0 exe [11501071.536889] [ 694022] 0 694022 4145 18 28672 0 0 exe [11501071.545366] [ 694030] 0 694030 4163 23 28672 0 0 exe [11501071.553838] [ 694034] 0 694034 4139 19 28672 0 0 exe [11501071.562358] [ 694036] 0 694036 4151 21 36864 0 0 exe [11501071.570839] [ 694037] 0 694037 4145 20 36864 0 0 exe [11501071.579320] [ 694045] 0 694045 14526 9564 163840 0 0 exe [11501071.587809] [ 694052] 0 694052 14526 9564 163840 0 0 exe [11501071.596298] [ 694071] 0 694071 4139 19 28672 0 0 exe [11501071.604777] [ 694161] 0 694161 4410 22 69632 0 0 exe [11501071.613247] [ 694162] 0 694162 4410 22 69632 0 0 exe [11501071.621724] [ 694185] 0 694185 4151 21 36864 0 0 exe [11501071.630199] [ 694224] 0 694224 4151 21 28672 0 0 exe [11501071.638671] [ 694225] 0 694225 4151 21 28672 0 0 exe [11501071.647153] [ 694228] 0 694228 4145 20 28672 0 0 exe [11501071.655632] [ 694244] 0 694244 4175 25 28672 0 0 exe [11501071.664109] [ 694246] 0 694246 4163 23 28672 0 0 exe [11501071.672594] [ 694247] 0 694247 4490 21 77824 0 0 exe [11501071.681076] [ 694277] 0 694277 4163 23 28672 0 0 exe [11501071.689550] [ 694290] 0 694290 4163 23 28672 0 0 exe [11501071.698028] [ 694377] 0 694377 4151 21 36864 0 0 exe [11501071.706500] [ 694392] 0 694392 4490 21 77824 0 0 exe [11501071.714977] [ 694394] 0 694394 4490 21 77824 0 0 exe [11501071.723458] [ 694396] 0 694396 4151 21 28672 0 0 exe [11501071.731943] [ 694408] 0 694408 184723 1752 139264 0 0 image [11501071.740798] [ 694415] 0 694415 184723 1034 139264 0 0 exe [11501071.749278] [ 694416] 0 694416 513283 58321 1081344 0 0 exe [11501071.757759] [ 694446] 0 694446 4157 22 36864 0 0 exe [11501071.766242] [ 694447] 0 694447 4414 23 53248 0 0 exe [11501071.774719] [ 694466] 0 694466 1 1 12288 0 0 exe [11501071.783195] [ 694484] 0 694484 28403 2743 237568 0 0 exe [11501071.791685] [ 694502] 0 694502 184787 1592 143360 0 0 image [11501071.800351] [ 694514] 0 694514 4157 22 28672 0 0 exe [11501071.808861] [ 694524] 0 694524 39838 11029 315392 0 0 exe [11501071.817368] [ 694549] 0 694549 852 1 53248 0 0 exe [11501071.825843] [ 694566] 0 694566 4157 22 36864 0 0 exe [11501071.834402] [ 694576] 0 694576 880 1 65536 0 0 exe [11501071.842869] [ 694577] 0 694577 694 1 49152 0 0 exe [11501071.851334] [ 694580] 0 694580 750 105 53248 0 0 exe [11501071.859803] [ 694586] 0 694586 715 1 49152 0 0 exe [11501071.868358] [ 694595] 0 694595 741 1 65536 0 0 exe [11501071.876821] [ 694596] 0 694596 778 1 61440 0 0 exe [11501071.885304] [ 694612] 0 694612 757 1 61440 0 0 exe [11501071.893778] [ 694623] 0 694623 1 1 12288 0 0 exe [11501071.902246] [ 694630] 0 694630 2893 1 77824 0 0 exe [11501071.910739] [ 694662] 0 694662 1 1 12288 0 0 exe [11501071.919325] [ 694718] 0 694718 1 1 12288 0 0 exe [11501071.927803] [ 694857] 0 694857 4157 22 28672 0 0 exe [11501071.936272] [ 694932] 0 694932 4414 23 53248 0 0 exe [11501071.944735] [ 694951] 0 694951 4151 21 36864 0 0 exe [11501071.953212] [ 694955] 0 694955 4151 21 36864 0 0 exe [11501071.961675] [ 695078] 0 695078 4151 21 28672 0 0 exe [11501071.970152] [ 695162] 0 695162 2332 1 69632 0 0 exe [11501071.978622] [ 695164] 0 695164 1 1 12288 0 0 exe [11501071.987093] [ 695172] 0 695172 1 1 12288 0 0 exe [11501071.995562] [ 695180] 0 695180 1 1 12288 0 0 exe [11501072.004123] [ 695181] 0 695181 1 1 12288 0 0 exe [11501072.012618] [ 695185] 0 695185 2342 1 77824 0 0 exe [11501072.021362] [ 695258] 0 695258 4157 22 36864 0 0 exe [11501072.029845] [ 695274] 0 695274 470664 11663 446464 0 0 image [11501072.038501] [ 695287] 0 695287 4151 21 36864 0 0 exe [11501072.047010] [ 695291] 0 695291 470376 10036 442368 0 0 image [11501072.055661] [ 695303] 0 695303 433606 10177 421888 0 0 exe [11501072.064139] [ 695304] 0 695304 1021192 21495 856064 0 0 exe [11501072.072604] [ 695316] 0 695316 19149 6855 208896 0 0 exe [11501072.081074] [ 695374] 0 695374 4151 21 36864 0 0 exe [11501072.089544] [ 695378] 0 695378 763 1 49152 0 0 exe [11501072.098099] [ 695395] 0 695395 732 1 61440 0 0 exe [11501072.106668] [ 695407] 0 695407 1 0 12288 0 0 exe [11501072.115243] [ 695424] 0 695424 2349 1 65536 0 0 exe [11501072.123738] [ 695428] 0 695428 4414 23 53248 0 0 exe [11501072.132218] [ 695430] 0 695430 4414 23 53248 0 0 exe [11501072.140702] [ 695446] 0 695446 28373 2754 233472 0 0 exe [11501072.149198] [ 695455] 0 695455 4163 23 28672 0 0 exe [11501072.157752] [ 695506] 0 695506 4151 21 36864 0 0 exe [11501072.166220] [ 695573] 0 695573 1 1 12288 0 0 exe [11501072.174810] [ 695756] 0 695756 4157 22 36864 0 0 exe [11501072.183276] [ 695758] 0 695758 4786 20 86016 0 0 exe [11501072.191749] [ 695797] 0 695797 4151 21 28672 0 0 exe [11501072.200233] [ 695804] 0 695804 4151 21 28672 0 0 exe [11501072.208703] [ 695811] 0 695811 4151 21 28672 0 0 exe [11501072.217187] [ 695812] 0 695812 4151 21 28672 0 0 exe [11501072.225653] [ 695819] 0 695819 4404 21 69632 0 0 exe [11501072.234223] [ 695838] 0 695838 4151 21 36864 0 0 exe [11501072.242691] [ 695847] 0 695847 4151 21 28672 0 0 exe [11501072.251178] [ 695864] 0 695864 4151 21 28672 0 0 exe [11501072.259909] [ 695870] 0 695870 4151 21 28672 0 0 exe [11501072.268392] [ 695871] 0 695871 4151 21 28672 0 0 exe [11501072.276876] [ 695943] 0 695943 88839 52103 778240 0 0 exe [11501072.285349] [ 695980] 0 695980 88839 52103 778240 0 0 exe [11501072.293810] [ 695995] 0 695995 88839 52103 778240 0 0 exe [11501072.302384] [ 695996] 0 695996 88839 52103 778240 0 0 exe [11501072.310859] [ 695997] 0 695997 88839 52103 778240 0 0 exe [11501072.319336] [ 696020] 0 696020 4157 22 36864 0 0 exe [11501072.327811] [ 696036] 0 696036 88839 52103 778240 0 0 exe [11501072.336276] [ 696038] 0 696038 4157 22 36864 0 0 exe [11501072.344757] [ 696060] 0 696060 88839 52103 778240 0 0 exe [11501072.353250] [ 696084] 0 696084 88839 52103 778240 0 0 exe [11501072.361735] [ 696095] 0 696095 88839 52103 778240 0 0 exe [11501072.370230] [ 696103] 0 696103 104233 69238 839680 0 0 exe [11501072.378726] [ 696275] 0 696275 88839 52103 778240 0 0 exe [11501072.387204] [ 696333] 0 696333 88839 52103 778240 0 0 exe [11501072.395686] [ 696393] 0 696393 4404 21 69632 0 0 exe [11501072.404164] [ 696436] 0 696436 4163 23 28672 0 0 exe [11501072.412645] [ 696461] 0 696461 4145 20 28672 0 0 exe [11501072.421130] [ 696466] 0 696466 4145 20 28672 0 0 exe [11501072.429607] [ 696470] 0 696470 489161 10282 450560 0 0 image [11501072.438270] [ 696498] 0 696498 507594 10895 454656 0 0 image [11501072.447028] [ 696505] 0 696505 452039 10525 434176 0 0 exe [11501072.455512] [ 696507] 0 696507 1416535 124257 2584576 0 0 exe [11501072.463991] [ 696547] 0 696547 433414 10037 425984 0 0 exe [11501072.472469] [ 696548] 0 696548 1538667 123504 2686976 0 0 exe [11501072.480967] [ 696635] 0 696635 4157 22 28672 0 0 exe [11501072.489444] [ 696636] 0 696636 4157 22 28672 0 0 exe [11501072.497920] [ 696656] 0 696656 4133 17 28672 0 0 exe [11501072.506399] [ 696661] 0 696661 4133 17 28672 0 0 exe [11501072.515326] [ 696679] 0 696679 1 1 12288 0 0 exe [11501072.523823] [ 696693] 0 696693 32449 2940 253952 0 0 exe [11501072.532306] [ 696702] 0 696702 32449 2940 253952 0 0 exe [11501072.540782] [ 696707] 0 696707 28446 2822 233472 0 0 exe [11501072.549262] [ 696718] 0 696718 32449 2940 253952 0 0 exe [11501072.557726] [ 696722] 0 696722 32449 2940 253952 0 0 exe [11501072.566201] [ 696802] 0 696802 4151 21 28672 0 0 exe [11501072.574684] [ 696803] 0 696803 4151 21 28672 0 0 exe [11501072.583169] [ 696821] 0 696821 4151 21 28672 0 0 exe [11501072.591719] [ 696917] 0 696917 1 1 12288 0 0 exe [11501072.600184] [ 696921] 0 696921 1 1 12288 0 0 exe [11501072.608665] [ 696925] 0 696925 1 1 12288 0 0 exe [11501072.617158] [ 696929] 0 696929 1 1 12288 0 0 exe [11501072.625652] [ 696933] 0 696933 1 1 12288 0 0 exe [11501072.634142] [ 696937] 0 696937 1 1 12288 0 0 exe [11501072.642633] [ 696941] 0 696941 1 1 12288 0 0 exe [11501072.651137] [ 697182] 0 697182 103587 69076 823296 0 0 exe [11501072.659652] [ 697183] 0 697183 103587 69076 823296 0 0 exe [11501072.668168] [ 697279] 0 697279 4157 22 28672 0 0 exe [11501072.676657] [ 697280] 0 697280 4157 22 28672 0 0 exe [11501072.685268] [ 697555] 0 697555 4157 22 36864 0 0 exe [11501072.693761] [ 697556] 0 697556 4157 22 36864 0 0 exe [11501072.703130] [ 697560] 0 697560 4157 22 36864 0 0 exe [11501072.711624] [ 697563] 0 697563 4145 20 28672 0 0 exe [11501072.720114] [ 697564] 0 697564 4151 21 28672 0 0 exe [11501072.728604] [ 697565] 0 697565 7905 22 98304 0 0 exe [11501072.737124] [ 697566] 0 697566 4145 20 28672 0 0 exe [11501072.745624] [ 697567] 0 697567 4151 21 28672 0 0 exe [11501072.754120] [ 697568] 0 697568 4151 21 28672 0 0 exe [11501072.762608] [ 697570] 0 697570 4151 21 28672 0 0 exe [11501072.771089] [ 697569] 0 697569 4157 22 28672 0 0 exe [11501072.779587] [ 697571] 0 697571 4467 18 69632 0 0 exe [11501072.788078] [ 697572] 0 697572 4145 20 28672 0 0 exe [11501072.796555] [ 697573] 0 697573 4151 21 28672 0 0 exe [11501072.805034] [ 697574] 0 697574 4133 29 28672 0 0 exe [11501072.813534] [ 697575] 0 697575 4151 21 28672 0 0 exe [11501072.822022] [ 697576] 0 697576 4133 18 28672 0 0 exe [11501072.830498] [ 697577] 0 697577 4145 20 28672 0 0 exe [11501072.838972] [ 697579] 0 697579 4467 18 69632 0 0 exe [11501072.847538] [ 697581] 0 697581 4151 21 28672 0 0 exe [11501072.856018] [ 697584] 0 697584 4133 29 28672 0 0 exe [11501072.864509] [ 697580] 0 697580 4151 21 28672 0 0 exe [11501072.872987] [ 697585] 0 697585 4151 21 28672 0 0 exe [11501072.881464] [ 697589] 0 697589 4151 21 28672 0 0 exe [11501072.890302] [ 697587] 0 697587 4145 20 28672 0 0 exe [11501072.898790] [ 697591] 0 697591 4151 21 28672 0 0 exe [11501072.907274] [ 697593] 0 697593 7905 22 98304 0 0 exe [11501072.915755] [ 697595] 0 697595 4133 27 28672 0 0 exe [11501072.924235] [ 697596] 0 697596 4145 20 28672 0 0 exe [11501072.933255] [ 697598] 0 697598 4133 18 28672 0 0 exe [11501072.941732] [ 697602] 0 697602 4151 21 28672 0 0 exe [11501072.950208] [ 697605] 0 697605 4467 18 69632 0 0 exe [11501072.958693] [ 697607] 0 697607 4133 27 28672 0 0 exe [11501072.967169] [ 697608] 0 697608 4133 18 28672 0 0 exe [11501072.975649] [ 697609] 0 697609 4151 21 28672 0 0 exe [11501072.984128] [ 697610] 0 697610 4145 20 28672 0 0 exe [11501072.992607] [ 697611] 0 697611 4212 21 53248 0 0 exe [11501073.001082] [ 697612] 0 697612 4467 18 69632 0 0 exe [11501073.009559] [ 697613] 0 697613 4467 18 69632 0 0 exe [11501073.018029] [ 697615] 0 697615 4133 18 28672 0 0 exe [11501073.026761] [ 697614] 0 697614 4151 21 28672 0 0 exe [11501073.035236] [ 697618] 0 697618 4151 21 28672 0 0 exe [11501073.043717] [ 697619] 0 697619 4151 21 28672 0 0 exe [11501073.052193] [ 697621] 0 697621 4133 18 28672 0 0 exe [11501073.060673] [ 697622] 0 697622 4494 16 57344 0 0 exe [11501073.069150] [ 697625] 0 697625 4151 21 28672 0 0 exe [11501073.077627] [ 697626] 0 697626 4151 21 28672 0 0 exe [11501073.086109] [ 697627] 0 697627 4133 18 28672 0 0 exe [11501073.094586] [ 697628] 0 697628 4151 21 28672 0 0 exe [11501073.103067] [ 697629] 0 697629 4151 21 28672 0 0 exe [11501073.111545] [ 697631] 0 697631 4494 16 57344 0 0 exe [11501073.120044] [ 697639] 0 697639 4151 21 28672 0 0 exe [11501073.128522] [ 697646] 0 697646 4151 21 28672 0 0 exe [11501073.137005] [ 697647] 0 697647 4151 21 28672 0 0 exe [11501073.145485] [ 697648] 0 697648 4133 18 28672 0 0 exe [11501073.153969] [ 697649] 0 697649 4212 21 53248 0 0 exe [11501073.162471] [ 697650] 0 697650 4467 18 69632 0 0 exe [11501073.170972] [ 697651] 0 697651 4145 20 28672 0 0 exe [11501073.179452] [ 697653] 0 697653 4133 18 28672 0 0 exe [11501073.187944] [ 697654] 0 697654 4151 21 28672 0 0 exe [11501073.196433] [ 697652] 0 697652 105692 71130 790528 0 0 exe [11501073.204930] [ 697655] 0 697655 4485 21 69632 0 0 exe [11501073.213429] [ 697656] 0 697656 4133 18 28672 0 0 exe [11501073.221928] [ 697657] 0 697657 4151 21 28672 0 0 exe [11501073.230406] [ 697658] 0 697658 4145 20 28672 0 0 exe [11501073.238880] [ 697659] 0 697659 4133 25 28672 0 0 exe [11501073.247354] [ 697660] 0 697660 4151 21 28672 0 0 exe [11501073.255830] [ 697661] 0 697661 4133 18 28672 0 0 exe [11501073.264322] [ 697662] 0 697662 4133 18 28672 0 0 exe [11501073.272796] [ 697663] 0 697663 4494 16 57344 0 0 exe [11501073.281278] [ 697664] 0 697664 4151 21 28672 0 0 exe [11501073.289756] [ 697665] 0 697665 4485 21 69632 0 0 exe [11501073.298231] [ 697666] 0 697666 4151 21 28672 0 0 exe [11501073.306709] [ 697667] 0 697667 4133 25 28672 0 0 exe [11501073.315211] [ 697668] 0 697668 4151 21 28672 0 0 exe [11501073.323808] [ 697669] 0 697669 4151 21 28672 0 0 exe [11501073.332296] [ 697670] 0 697670 4151 21 28672 0 0 exe [11501073.340782] [ 697671] 0 697671 4494 16 57344 0 0 exe [11501073.349261] [ 697672] 0 697672 4151 21 28672 0 0 exe [11501073.357739] [ 697673] 0 697673 4151 21 28672 0 0 exe [11501073.366213] [ 697674] 0 697674 4133 18 28672 0 0 exe [11501073.374697] [ 697675] 0 697675 4145 20 28672 0 0 exe [11501073.383164] [ 697676] 0 697676 4133 18 28672 0 0 exe [11501073.391638] [ 697677] 0 697677 4151 21 28672 0 0 exe [11501073.400190] [ 697678] 0 697678 4133 18 28672 0 0 exe [11501073.408745] [ 697680] 0 697680 4157 22 36864 0 0 exe [11501073.417245] [ 697684] 0 697684 4145 20 28672 0 0 exe [11501073.425715] [ 697687] 0 697687 105692 71130 790528 0 0 exe [11501073.434217] [ 697688] 0 697688 105692 71130 790528 0 0 exe [11501073.442694] [ 697689] 0 697689 4145 20 28672 0 0 exe [11501073.451172] [ 697690] 0 697690 105692 71130 790528 0 0 exe [11501073.459663] [ 697692] 0 697692 4151 21 28672 0 0 exe [11501073.468150] [ 697700] 0 697700 4151 21 28672 0 0 exe [11501073.476637] [ 697742] 0 697742 105692 71130 790528 0 0 exe [11501073.485125] [ 697746] 0 697746 105692 71130 790528 0 0 exe [11501073.493610] [ 697748] 0 697748 105692 71130 790528 0 0 exe [11501073.502092] [ 697788] 0 697788 4151 21 28672 0 0 exe [11501073.510575] [ 697800] 0 697800 105692 71130 790528 0 0 exe [11501073.519068] [ 697809] 0 697809 4157 22 36864 0 0 exe [11501073.527557] [ 697894] 0 697894 105692 71130 790528 0 0 exe [11501073.536044] [ 698176] 0 698176 4157 22 28672 0 0 exe [11501073.544529] [ 698330] 0 698330 4151 21 28672 0 0 exe [11501073.553011] [ 698352] 0 698352 105692 71130 790528 0 0 exe [11501073.561491] [ 698353] 0 698353 105692 71130 790528 0 0 exe [11501073.569970] [ 698375] 0 698375 4151 21 28672 0 0 exe [11501073.578473] [ 698376] 0 698376 105692 71130 790528 0 0 exe [11501073.586972] [ 698399] 0 698399 105692 71130 790528 0 0 exe [11501073.595471] [ 698401] 0 698401 104233 69238 839680 0 0 exe [11501073.603956] [ 698403] 0 698403 104233 69238 839680 0 0 exe [11501073.612454] [ 698415] 0 698415 105692 71130 790528 0 0 exe [11501073.620946] [ 698431] 0 698431 104233 69238 839680 0 0 exe [11501073.629448] [ 698432] 0 698432 104233 69238 839680 0 0 exe [11501073.637929] [ 698457] 0 698457 4133 16 28672 0 0 exe [11501073.646407] [ 698458] 0 698458 4133 16 28672 0 0 exe [11501073.654885] [ 698459] 0 698459 6351 20 98304 0 0 exe [11501073.663360] [ 698461] 0 698461 6351 20 98304 0 0 exe [11501073.671837] [ 698462] 0 698462 4145 20 28672 0 0 exe [11501073.680324] [ 698463] 0 698463 4145 20 28672 0 0 exe [11501073.688814] [ 698464] 0 698464 4133 16 28672 0 0 exe [11501073.697833] [ 698465] 0 698465 4133 16 28672 0 0 exe [11501073.706327] [ 698466] 0 698466 4133 16 28672 0 0 exe [11501073.714821] [ 698467] 0 698467 4133 16 28672 0 0 exe [11501073.723308] [ 698468] 0 698468 4133 16 28672 0 0 exe [11501073.731791] [ 698469] 0 698469 4133 16 28672 0 0 exe [11501073.740362] [ 698470] 0 698470 4133 16 28672 0 0 exe [11501073.748854] [ 698471] 0 698471 4133 16 28672 0 0 exe [11501073.757338] [ 698472] 0 698472 4133 16 28672 0 0 exe [11501073.765805] [ 698473] 0 698473 4133 16 28672 0 0 exe [11501073.774359] [ 698475] 0 698475 6351 20 98304 0 0 exe [11501073.782842] [ 698476] 0 698476 4145 20 28672 0 0 exe [11501073.791325] [ 698480] 0 698480 105692 71130 790528 0 0 exe [11501073.799786] [ 698489] 0 698489 6351 20 98304 0 0 exe [11501073.808273] [ 698516] 0 698516 4145 20 28672 0 0 exe [11501073.816743] [ 698857] 0 698857 103587 69076 823296 0 0 exe [11501073.825219] [ 698871] 0 698871 103587 69076 823296 0 0 exe [11501073.833698] [ 698957] 0 698957 6284 21 94208 0 0 exe [11501073.842185] [ 699027] 0 699027 4506 18 57344 0 0 exe [11501073.850754] [ 699028] 0 699028 4506 18 57344 0 0 exe [11501073.859245] [ 699031] 0 699031 4485 21 69632 0 0 exe [11501073.867705] [ 699035] 0 699035 4485 21 69632 0 0 exe [11501073.876184] [ 699064] 0 699064 4151 21 28672 0 0 exe [11501073.884654] [ 699115] 0 699115 415237 9183 417792 0 0 image [11501073.893298] [ 699116] 0 699116 4485 21 69632 0 0 exe [11501073.901769] [ 699133] 0 699133 470472 10223 442368 0 0 exe [11501073.910239] [ 699134] 0 699134 900916 18177 794624 0 0 exe [11501073.918702] [ 699187] 0 699187 4133 17 28672 0 0 exe [11501073.927168] [ 699190] 0 699190 4133 17 28672 0 0 exe [11501073.935629] [ 699203] 0 699203 32774 2866 253952 0 0 exe [11501073.944100] [ 699204] 0 699204 32774 2866 253952 0 0 exe [11501073.952569] [ 699208] 0 699208 32774 2866 253952 0 0 exe [11501073.961063] [ 699209] 0 699209 32774 2866 253952 0 0 exe [11501073.969540] [ 699210] 0 699210 32774 2866 253952 0 0 exe [11501073.978100] [ 699224] 0 699224 470440 9076 442368 0 0 image [11501073.986744] [ 699235] 0 699235 23048 7202 233472 0 0 exe [11501073.995210] [ 699236] 0 699236 23048 7202 233472 0 0 exe [11501074.003668] [ 699237] 0 699237 23048 7202 233472 0 0 exe [11501074.012134] [ 699240] 0 699240 23048 7202 233472 0 0 exe [11501074.020622] [ 699241] 0 699241 23048 7202 233472 0 0 exe [11501074.029618] [ 699244] 0 699244 23048 7202 233472 0 0 exe [11501074.038080] [ 699245] 0 699245 23048 7202 233472 0 0 exe [11501074.046544] [ 699253] 0 699253 4345 18 81920 0 0 exe [11501074.055011] [ 699254] 0 699254 4345 18 81920 0 0 exe [11501074.063563] [ 699260] 0 699260 4653 18 86016 0 0 exe [11501074.072031] [ 699262] 0 699262 4653 18 86016 0 0 exe [11501074.080495] [ 699357] 0 699357 6107 19 94208 0 0 exe [11501074.088965] [ 699358] 0 699358 6107 19 94208 0 0 exe [11501074.097441] [ 699359] 0 699359 4151 21 36864 0 0 exe [11501074.105901] [ 699363] 0 699363 6107 19 94208 0 0 exe [11501074.114362] [ 699381] 0 699381 452167 10237 421888 0 0 image [11501074.122998] [ 699389] 0 699389 433446 9942 421888 0 0 image [11501074.131719] [ 699421] 0 699421 433414 9787 425984 0 0 exe [11501074.140196] [ 699422] 0 699422 949114 19896 831488 0 0 exe [11501074.148662] [ 699435] 0 699435 18543 6580 212992 0 0 exe [11501074.157149] [ 699485] 0 699485 539 1 49152 0 0 exe [11501074.165708] [ 699496] 0 699496 602 1 61440 0 0 exe [11501074.174280] [ 699507] 0 699507 1 1 12288 0 0 exe [11501074.183458] [ 699515] 0 699515 37102 20194 368640 0 0 exe [11501074.191928] [ 699517] 0 699517 37102 20194 368640 0 0 exe [11501074.200393] [ 699518] 0 699518 37102 20194 368640 0 0 exe [11501074.208856] [ 699533] 0 699533 28300 2799 237568 0 0 exe [11501074.217325] [ 699546] 0 699546 1 1 12288 0 0 exe [11501074.225875] [ 699705] 0 699705 4151 21 28672 0 0 exe [11501074.234353] [ 699710] 0 699710 4151 21 28672 0 0 exe [11501074.244208] [ 699802] 0 699802 4151 21 28672 0 0 exe [11501074.252763] [ 699819] 0 699819 103587 69076 823296 0 0 exe [11501074.261247] [ 699822] 0 699822 4151 21 28672 0 0 exe [11501074.269723] [ 699824] 0 699824 4151 21 28672 0 0 exe [11501074.278198] [ 699858] 0 699858 4157 22 36864 0 0 exe [11501074.286674] [ 699966] 0 699966 4157 22 28672 0 0 exe [11501074.295148] [ 699967] 0 699967 4151 21 28672 0 0 exe [11501074.303616] [ 699968] 0 699968 4151 21 28672 0 0 exe [11501074.312083] [ 699972] 0 699972 4151 21 28672 0 0 exe [11501074.320552] [ 700153] 0 700153 4169 24 28672 0 0 exe [11501074.329029] [ 700235] 0 700235 4163 23 28672 0 0 exe [11501074.337492] [ 700396] 0 700396 4151 21 28672 0 0 exe [11501074.345987] [ 700397] 0 700397 4151 21 28672 0 0 exe [11501074.354450] [ 700422] 0 700422 4151 21 28672 0 0 exe [11501074.362915] [ 700546] 0 700546 1 1 12288 0 0 exe [11501074.371382] [ 700548] 0 700548 1 1 12288 0 0 exe [11501074.379851] [ 700556] 0 700556 1 1 12288 0 0 exe [11501074.388325] [ 700558] 0 700558 1 1 12288 0 0 exe [11501074.396796] [ 700564] 0 700564 1 1 12288 0 0 exe [11501074.405901] [ 700722] 0 700722 4157 22 28672 0 0 exe [11501074.414366] [ 700723] 0 700723 4157 22 28672 0 0 exe [11501074.422828] [ 700753] 0 700753 4151 19 28672 0 0 exe [11501074.431307] [ 701152] 0 701152 4157 22 28672 0 0 exe [11501074.439771] [ 701201] 0 701201 4157 22 28672 0 0 exe [11501074.448323] [ 701214] 0 701214 4151 21 28672 0 0 exe [11501074.456788] [ 701237] 0 701237 4151 21 28672 0 0 exe [11501074.465261] [ 701455] 0 701455 4163 23 28672 0 0 exe [11501074.473726] [ 701527] 0 701527 88839 52103 778240 0 0 exe [11501074.482203] [ 701529] 0 701529 88839 52103 778240 0 0 exe [11501074.490669] [ 701530] 0 701530 88839 52103 778240 0 0 exe [11501074.499166] [ 702117] 0 702117 4545 21 81920 0 0 exe [11501074.507653] [ 702193] 0 702193 4157 22 28672 0 0 exe [11501074.516119] [ 702215] 0 702215 4145 20 28672 0 0 exe [11501074.524598] [ 702249] 0 702249 4145 20 28672 0 0 exe [11501074.533064] [ 702372] 0 702372 4151 21 28672 0 0 exe [11501074.541536] [ 702375] 0 702375 4151 21 28672 0 0 exe [11501074.550002] [ 702376] 0 702376 4151 21 28672 0 0 exe [11501074.558463] [ 702387] 0 702387 4151 21 28672 0 0 exe [11501074.566929] [ 702436] 0 702436 4145 20 36864 0 0 exe [11501074.575391] [ 702438] 0 702438 4145 20 36864 0 0 exe [11501074.584030] [ 702528] 0 702528 4151 21 28672 0 0 exe [11501074.592500] [ 703105] 0 703105 4157 22 28672 0 0 exe [11501074.600976] [ 703107] 0 703107 4151 21 28672 0 0 exe [11501074.610231] [ 703110] 0 703110 4151 21 28672 0 0 exe [11501074.618708] [ 703111] 0 703111 4151 21 28672 0 0 exe [11501074.627257] [ 703112] 0 703112 4151 21 28672 0 0 exe [11501074.635813] [ 703160] 0 703160 4302 22 73728 0 0 exe [11501074.644275] [ 703168] 0 703168 4163 23 28672 0 0 exe [11501074.652748] [ 703170] 0 703170 4163 23 28672 0 0 exe [11501074.661218] [ 703185] 0 703185 4157 22 28672 0 0 exe [11501074.669686] [ 703349] 65534 703349 1 1 12288 0 0 exe [11501074.678152] [ 703392] 0 703392 4545 21 81920 0 0 exe [11501074.686633] [ 703465] 0 703465 4551 22 81920 0 0 exe [11501074.695143] [ 703466] 0 703466 4551 22 81920 0 0 exe [11501074.703687] [ 703474] 0 703474 4151 21 28672 0 0 exe [11501074.712280] [ 703483] 0 703483 4551 22 81920 0 0 exe [11501074.720767] [ 703492] 0 703492 4157 22 28672 0 0 exe [11501074.729255] [ 703500] 0 703500 4302 22 73728 0 0 exe [11501074.737721] [ 703643] 0 703643 105692 71130 790528 0 0 exe [11501074.746186] [ 703644] 0 703644 105692 71130 790528 0 0 exe [11501074.754648] [ 703645] 0 703645 105692 71130 790528 0 0 exe [11501074.763119] [ 703646] 0 703646 105692 71130 790528 0 0 exe [11501074.771605] [ 703724] 0 703724 4551 22 81920 0 0 exe [11501074.780768] [ 703827] 0 703827 4545 21 81920 0 0 exe [11501074.789252] [ 703887] 0 703887 36822 20338 352256 0 0 exe [11501074.797718] [ 704040] 0 704040 4163 23 28672 0 0 exe [11501074.806651] [ 704065] 0 704065 4151 21 36864 0 0 exe [11501074.815133] [ 704067] 0 704067 4151 21 36864 0 0 exe [11501074.823625] [ 704078] 0 704078 4151 21 36864 0 0 exe [11501074.832115] [ 704112] 0 704112 4151 21 36864 0 0 exe [11501074.840582] [ 704113] 0 704113 4151 21 36864 0 0 exe [11501074.849047] [ 704140] 0 704140 104233 69238 839680 0 0 exe [11501074.857529] [ 704178] 0 704178 4145 20 36864 0 0 exe [11501074.866000] [ 704179] 0 704179 4145 20 36864 0 0 exe [11501074.874468] [ 704291] 0 704291 4151 21 28672 0 0 exe [11501074.882949] [ 704292] 0 704292 4151 21 28672 0 0 exe [11501074.891417] [ 704295] 0 704295 4151 21 28672 0 0 exe [11501074.899896] [ 704361] 0 704361 4145 20 36864 0 0 exe [11501074.908364] [ 704362] 0 704362 4145 20 36864 0 0 exe [11501074.916843] [ 704426] 0 704426 4151 21 36864 0 0 exe [11501074.925320] [ 704430] 0 704430 4163 23 28672 0 0 exe [11501074.933795] [ 704490] 0 704490 4145 20 36864 0 0 exe [11501074.942351] [ 704491] 0 704491 4145 20 36864 0 0 exe [11501074.950819] [ 704492] 0 704492 4151 21 36864 0 0 exe [11501074.959315] [ 704494] 0 704494 1 1 12288 0 0 exe [11501074.967791] [ 704572] 0 704572 4212 21 53248 0 0 exe [11501074.976264] [ 704573] 0 704573 4212 21 53248 0 0 exe [11501074.984738] [ 704575] 0 704575 4151 21 36864 0 0 exe [11501074.993220] [ 704576] 0 704576 4151 21 36864 0 0 exe [11501075.001683] [ 704577] 0 704577 4212 21 53248 0 0 exe [11501075.010148] [ 704578] 0 704578 4539 20 81920 0 0 exe [11501075.018633] [ 704580] 0 704580 4151 21 36864 0 0 exe [11501075.027108] [ 704581] 0 704581 4151 21 36864 0 0 exe [11501075.035667] [ 704585] 0 704585 4559 21 73728 0 0 exe [11501075.044137] [ 704586] 0 704586 4559 21 73728 0 0 exe [11501075.052617] [ 704768] 0 704768 4151 21 36864 0 0 exe [11501075.061089] [ 704936] 0 704936 4139 19 36864 0 0 exe [11501075.069554] [ 704939] 0 704939 4151 21 36864 0 0 exe [11501075.078104] [ 704950] 0 704950 4163 23 28672 0 0 exe [11501075.086574] [ 705275] 0 705275 103587 69076 823296 0 0 exe [11501075.095037] [ 705276] 0 705276 103587 69076 823296 0 0 exe [11501075.103498] [ 705277] 0 705277 103587 69076 823296 0 0 exe [11501075.111968] [ 705324] 0 705324 4151 21 36864 0 0 exe [11501075.120435] [ 705328] 0 705328 48587 44044 438272 0 0 exe [11501075.128918] [ 705329] 0 705329 48587 44044 438272 0 0 exe [11501075.137479] [ 705330] 0 705330 48587 44044 438272 0 0 exe [11501075.145964] [ 705359] 65534 705359 1 1 12288 0 0 exe [11501075.154439] [ 705371] 0 705371 4175 25 28672 0 0 exe [11501075.162901] [ 705372] 0 705372 4175 25 28672 0 0 exe [11501075.171360] [ 705392] 0 705392 4151 21 36864 0 0 exe [11501075.179831] [ 705600] 0 705600 4151 21 36864 0 0 exe [11501075.188306] [ 705604] 0 705604 103587 69076 823296 0 0 exe [11501075.196773] [ 705605] 0 705605 103587 69076 823296 0 0 exe [11501075.205246] [ 705791] 0 705791 48587 44044 438272 0 0 exe [11501075.213839] [ 705792] 0 705792 48587 44044 438272 0 0 exe [11501075.222311] [ 705804] 0 705804 4151 21 28672 0 0 exe [11501075.230772] [ 705812] 0 705812 1 1 12288 0 0 exe [11501075.239250] [ 705845] 0 705845 4157 22 28672 0 0 exe [11501075.247712] [ 705846] 0 705846 4145 18 28672 0 0 exe [11501075.256198] [ 705847] 0 705847 4157 22 28672 0 0 exe [11501075.264674] [ 705848] 0 705848 4133 16 28672 0 0 exe [11501075.273237] [ 705849] 0 705849 4133 16 28672 0 0 exe [11501075.281707] [ 705850] 0 705850 4133 16 28672 0 0 exe [11501075.290179] [ 705852] 0 705852 4145 18 28672 0 0 exe [11501075.298651] [ 705851] 0 705851 4133 16 28672 0 0 exe [11501075.307127] [ 705853] 0 705853 4133 16 28672 0 0 exe [11501075.315604] [ 705854] 0 705854 4133 16 28672 0 0 exe [11501075.324068] [ 705856] 0 705856 4133 16 28672 0 0 exe [11501075.332531] [ 705855] 0 705855 4133 16 28672 0 0 exe [11501075.340992] [ 705857] 0 705857 4133 16 28672 0 0 exe [11501075.349515] [ 705858] 0 705858 4133 16 28672 0 0 exe [11501075.358010] [ 705859] 0 705859 4133 16 28672 0 0 exe [11501075.366582] [ 705860] 0 705860 4133 16 28672 0 0 exe [11501075.375147] [ 705861] 0 705861 4133 16 28672 0 0 exe [11501075.383617] [ 705864] 0 705864 4133 16 28672 0 0 exe [11501075.392115] [ 705862] 0 705862 4133 16 28672 0 0 exe [11501075.400598] [ 705863] 0 705863 4145 18 28672 0 0 exe [11501075.409068] [ 705865] 0 705865 4133 16 28672 0 0 exe [11501075.417621] [ 705866] 0 705866 4157 22 28672 0 0 exe [11501075.426078] [ 705867] 0 705867 4133 16 28672 0 0 exe [11501075.434542] [ 705868] 0 705868 4133 16 28672 0 0 exe [11501075.443000] [ 705869] 0 705869 4133 16 28672 0 0 exe [11501075.451497] [ 705870] 0 705870 4133 16 28672 0 0 exe [11501075.460054] [ 705871] 0 705871 4157 22 28672 0 0 exe [11501075.468528] [ 705872] 0 705872 4145 18 28672 0 0 exe [11501075.477007] [ 705873] 0 705873 4133 16 28672 0 0 exe [11501075.485482] [ 705874] 0 705874 4133 16 28672 0 0 exe [11501075.493944] [ 705875] 0 705875 4133 16 28672 0 0 exe [11501075.502500] [ 705876] 0 705876 4133 16 28672 0 0 exe [11501075.511057] [ 705877] 0 705877 4133 16 28672 0 0 exe [11501075.519615] [ 705878] 0 705878 4157 22 28672 0 0 exe [11501075.528081] [ 705879] 0 705879 4133 16 28672 0 0 exe [11501075.536553] [ 705880] 0 705880 4157 22 28672 0 0 exe [11501075.545019] [ 705881] 0 705881 4133 16 28672 0 0 exe [11501075.553489] [ 705882] 0 705882 4133 16 28672 0 0 exe [11501075.561959] [ 705883] 0 705883 4133 16 28672 0 0 exe [11501075.570422] [ 705884] 0 705884 4133 16 28672 0 0 exe [11501075.578897] [ 705885] 0 705885 4133 16 28672 0 0 exe [11501075.587374] [ 705886] 0 705886 4133 16 28672 0 0 exe [11501075.595834] [ 705887] 0 705887 4163 23 28672 0 0 exe [11501075.604297] [ 705888] 0 705888 4133 16 28672 0 0 exe [11501075.612760] [ 705889] 0 705889 4133 16 28672 0 0 exe [11501075.621229] [ 705890] 0 705890 4133 16 28672 0 0 exe [11501075.629697] [ 705891] 0 705891 4133 16 28672 0 0 exe [11501075.638189] [ 705892] 0 705892 4133 16 28672 0 0 exe [11501075.646648] [ 705893] 0 705893 4133 16 28672 0 0 exe [11501075.655108] [ 705894] 0 705894 4133 16 28672 0 0 exe [11501075.663568] [ 705895] 0 705895 4163 23 28672 0 0 exe [11501075.672037] [ 705896] 0 705896 4133 16 28672 0 0 exe [11501075.680508] [ 705897] 0 705897 4133 16 28672 0 0 exe [11501075.688999] [ 705898] 0 705898 4133 16 28672 0 0 exe [11501075.697569] [ 705899] 0 705899 4133 16 28672 0 0 exe [11501075.706040] [ 705900] 0 705900 4133 16 28672 0 0 exe [11501075.714504] [ 705901] 0 705901 4133 16 28672 0 0 exe [11501075.722963] [ 705903] 0 705903 4133 16 28672 0 0 exe [11501075.731426] [ 705902] 0 705902 4133 16 28672 0 0 exe [11501075.739896] [ 705904] 0 705904 4133 16 28672 0 0 exe [11501075.748453] [ 705905] 0 705905 4133 16 28672 0 0 exe [11501075.757000] [ 705906] 0 705906 4133 16 28672 0 0 exe [11501075.765475] [ 705907] 0 705907 4133 16 28672 0 0 exe [11501075.773941] [ 705908] 0 705908 4163 23 28672 0 0 exe [11501075.782405] [ 705910] 0 705910 4163 23 28672 0 0 exe [11501075.790867] [ 705909] 0 705909 4169 24 28672 0 0 exe [11501075.799331] [ 705911] 0 705911 4133 16 28672 0 0 exe [11501075.807797] [ 705912] 0 705912 6981 22 98304 0 0 exe [11501075.816262] [ 705913] 0 705913 4133 16 28672 0 0 exe [11501075.824735] [ 705914] 0 705914 4133 16 28672 0 0 exe [11501075.833215] [ 705915] 0 705915 4133 16 28672 0 0 exe [11501075.841684] [ 705916] 0 705916 6981 22 98304 0 0 exe [11501075.850158] [ 705917] 0 705917 4169 24 28672 0 0 exe [11501075.858626] [ 705918] 0 705918 4133 16 28672 0 0 exe [11501075.867086] [ 705919] 0 705919 4157 22 28672 0 0 exe [11501075.875551] [ 705920] 0 705920 4163 23 28672 0 0 exe [11501075.884047] [ 705921] 0 705921 4157 22 28672 0 0 exe [11501075.892515] [ 705923] 0 705923 4163 23 28672 0 0 exe [11501075.900985] [ 705924] 0 705924 4157 22 28672 0 0 exe [11501075.909481] [ 705925] 0 705925 4163 23 28672 0 0 exe [11501075.917945] [ 705926] 0 705926 4157 22 28672 0 0 exe [11501075.926411] [ 705943] 0 705943 4157 22 28672 0 0 exe [11501075.934875] [ 705972] 0 705972 4163 23 28672 0 0 exe [11501075.943333] [ 705973] 0 705973 4163 23 28672 0 0 exe [11501075.951886] [ 705974] 0 705974 4163 23 28672 0 0 exe [11501075.960346] [ 705975] 0 705975 4163 23 28672 0 0 exe [11501075.968896] [ 705976] 0 705976 4157 22 28672 0 0 exe [11501075.977367] [ 705978] 0 705978 4157 22 28672 0 0 exe [11501075.985836] [ 706024] 0 706024 4163 23 28672 0 0 exe [11501075.994306] [ 706108] 0 706108 4169 24 28672 0 0 exe [11501076.002780] [ 706121] 0 706121 4151 21 36864 0 0 exe [11501076.011260] [ 706122] 0 706122 4151 21 36864 0 0 exe [11501076.019735] [ 706125] 0 706125 4151 21 36864 0 0 exe [11501076.028198] [ 706126] 0 706126 4151 21 36864 0 0 exe [11501076.036743] [ 706127] 0 706127 4151 21 36864 0 0 exe [11501076.045212] [ 706131] 0 706131 4169 24 28672 0 0 exe [11501076.053680] [ 706164] 0 706164 4169 24 28672 0 0 exe [11501076.062152] [ 706165] 0 706165 4169 24 28672 0 0 exe [11501076.070702] [ 706166] 0 706166 4169 24 28672 0 0 exe [11501076.079177] [ 706167] 0 706167 4151 21 28672 0 0 exe [11501076.087640] [ 706175] 0 706175 4151 21 28672 0 0 exe [11501076.096108] [ 706176] 0 706176 4559 21 53248 0 0 exe [11501076.104580] [ 706213] 0 706213 4139 19 28672 0 0 exe [11501076.113044] [ 706295] 0 706295 4163 23 28672 0 0 exe [11501076.121521] [ 706311] 0 706311 4485 21 69632 0 0 exe [11501076.130006] [ 706390] 0 706390 4145 20 28672 0 0 exe [11501076.138476] [ 706403] 0 706403 4163 23 28672 0 0 exe [11501076.146937] [ 706418] 0 706418 6806 23 98304 0 0 exe [11501076.155417] [ 706419] 0 706419 6806 23 98304 0 0 exe [11501076.163883] [ 706452] 0 706452 4139 19 28672 0 0 exe [11501076.172357] [ 706453] 0 706453 4151 21 28672 0 0 exe [11501076.180828] [ 706454] 0 706454 4151 21 28672 0 0 exe [11501076.189296] [ 706471] 0 706471 4551 22 81920 0 0 exe [11501076.197760] [ 706472] 0 706472 4151 21 28672 0 0 exe [11501076.206224] [ 706474] 0 706474 4151 21 28672 0 0 exe [11501076.214685] [ 706478] 0 706478 4151 21 28672 0 0 exe [11501076.223157] [ 706523] 0 706523 4145 20 28672 0 0 exe [11501076.231641] [ 706524] 0 706524 4145 20 28672 0 0 exe [11501076.240106] [ 706700] 0 706700 4163 23 28672 0 0 exe [11501076.248571] [ 706810] 0 706810 4151 21 28672 0 0 exe [11501076.257045] [ 706812] 0 706812 4163 23 28672 0 0 exe [11501076.265519] [ 706834] 0 706834 4151 21 28672 0 0 exe [11501076.273979] [ 706835] 0 706835 4151 21 28672 0 0 exe [11501076.282441] [ 706851] 0 706851 4157 22 36864 0 0 exe [11501076.290900] [ 706852] 0 706852 4157 22 36864 0 0 exe [11501076.299455] [ 706856] 0 706856 4151 21 28672 0 0 exe [11501076.308007] [ 706857] 0 706857 4157 22 36864 0 0 exe [11501076.316475] [ 706927] 0 706927 4145 19 36864 0 0 exe [11501076.324941] [ 706928] 0 706928 4151 21 36864 0 0 exe [11501076.333508] [ 706985] 0 706985 4151 21 36864 0 0 exe [11501076.341995] [ 707090] 0 707090 4151 21 28672 0 0 exe [11501076.350447] rcu: INFO: rcu_sched self-detected stall on CPU [11501076.350450] rcu: 24-....: (2449 ticks this GP) idle=fd2/1/0x4000000000000000 softirq=1207888855/1207888855 fqs=2415 [11501076.350453] (t=5250 jiffies g=2095195277 q=7476) [11501076.350455] NMI backtrace for cpu 24 [11501076.350457] CPU: 24 PID: 653819 Comm: exe Tainted: G L 5.9.0-0.bpo.5-cloud-amd64 #1 Debian 5.9.15-1~bpo10+1 [11501076.350458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [11501076.350458] Call Trace: [11501076.350461] [11501076.350467] dump_stack+0x6d/0x88 [11501076.350469] nmi_cpu_backtrace.cold.8+0x13/0x50 [11501076.350471] ? lapic_can_unplug_cpu+0x80/0x80 [11501076.350473] nmi_trigger_cpumask_backtrace+0xf9/0x100 [11501076.350476] rcu_dump_cpu_stacks+0xab/0xd9 [11501076.350477] rcu_sched_clock_irq.cold.94+0x109/0x365 [11501076.350480] ? trigger_load_balance+0x5c/0x220 [11501076.350482] ? tick_sched_do_timer+0x60/0x60 [11501076.350483] update_process_times+0x24/0x50 [11501076.350485] tick_sched_handle.isra.22+0x1f/0x60 [11501076.350486] tick_sched_timer+0x65/0x80 [11501076.350487] __hrtimer_run_queues+0x100/0x280 [11501076.350488] hrtimer_interrupt+0x100/0x220 [11501076.350490] __sysvec_apic_timer_interrupt+0x5d/0xf0 [11501076.350492] asm_call_irq_on_stack+0x12/0x20 [11501076.350493] [11501076.350495] sysvec_apic_timer_interrupt+0x73/0x80 [11501076.350496] asm_sysvec_apic_timer_interrupt+0x12/0x20 [11501076.350498] RIP: 0010:console_unlock+0x369/0x4d0 [11501076.350500] Code: 85 ed fc ff ff e9 4a ff ff ff 89 ea 48 c7 c6 80 a8 a1 b1 4c 89 f7 e8 f6 c0 92 00 e9 8c fe ff ff e8 dc 23 00 00 4c 89 ff 57 9d <0f> 1f 44 00 00 8b 04 24 85 c0 0f 84 fc fc ff ff e8 32 b8 71 00 e9 [11501076.350500] RSP: 0018:ffffad7905b67a30 EFLAGS: 00000247 [11501076.350502] RAX: 0000000000000001 RBX: ffffffffb153bf20 RCX: 0000000000000000 [11501076.350502] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000247 [11501076.350503] RBP: 000000000000005f R08: 0720072007200720 R09: 0720072007200720 [11501076.350503] R10: 0720072007200720 R11: 0720072007200720 R12: ffffffffb1a1b490 [11501076.350504] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000247 [11501076.350506] vprintk_emit+0x184/0x290 [11501076.350507] printk+0x58/0x6f [11501076.350510] dump_task+0x114/0x130 [11501076.350512] dump_header+0x160/0x1d8 [11501076.350513] oom_kill_process.cold.36+0xb/0x10 [11501076.350514] out_of_memory+0x1a8/0x4d0 [11501076.350516] __alloc_pages_slowpath.constprop.111+0xbeb/0xcd0 [11501076.350518] __alloc_pages_nodemask+0x2de/0x310 [11501076.350520] alloc_pages_vma+0x74/0x1e0 [11501076.350522] wp_page_copy+0x47d/0x7a0 [11501076.350524] handle_mm_fault+0x5ff/0x1660 [11501076.350526] exc_page_fault+0x290/0x550 [11501076.350527] ? asm_exc_page_fault+0x8/0x30 [11501076.350528] asm_exc_page_fault+0x1e/0x30 [11501076.350529] RIP: 0033:0x26fb438 [11501076.350534] Code: Unable to access opcode bytes at RIP 0x26fb40e. [11501076.350535] RSP: 002b:00007f77c6ffd230 EFLAGS: 00010246 [11501076.350536] RAX: 00002185f0acb000 RBX: 0000000003ffe010 RCX: 0000000000000000 [11501076.350536] RDX: 000000000dc7cbff RSI: 00002185f0acb000 RDI: 00007f7cabdda700 [11501076.350536] RBP: 000000c00116b190 R08: 00000000017e8810 R09: 00000000000000cb [11501076.350537] R10: 000000000dc7cb00 R11: 00007f7ac4f51e38 R12: 000000c00116b158 [11501076.350537] R13: 000000c01f586000 R14: 000000c000df2000 R15: 000000c00116c000 [11501076.668628] [ 707250] 0 707250 396868 9679 413696 0 0 image [11501076.677280] [ 707270] 0 707270 435846 9512 442368 0 0 exe [11501076.685749] [ 707272] 0 707272 1380297 96934 2056192 0 0 exe [11501076.694212] [ 707303] 0 707303 4157 22 28672 0 0 exe [11501076.702683] [ 707325] 0 707325 1 0 12288 0 0 exe [11501076.711152] [ 707346] 0 707346 28785 3128 237568 0 0 exe [11501076.719623] [ 707568] 0 707568 4145 20 28672 0 0 exe [11501076.728095] [ 707569] 0 707569 4145 20 28672 0 0 exe [11501076.736558] [ 707570] 0 707570 4151 21 28672 0 0 exe [11501076.745027] [ 707582] 0 707582 4151 21 28672 0 0 exe [11501076.753595] [ 707589] 0 707589 4151 21 28672 0 0 exe [11501076.762064] [ 707590] 0 707590 4151 21 28672 0 0 exe [11501076.770534] [ 707605] 0 707605 4151 21 28672 0 0 exe [11501076.779000] [ 707622] 0 707622 4151 19 28672 0 0 exe [11501076.787476] [ 707623] 0 707623 4151 19 28672 0 0 exe [11501076.795949] [ 707625] 0 707625 4151 21 28672 0 0 exe [11501076.804413] [ 707626] 0 707626 4151 21 28672 0 0 exe [11501076.812891] [ 707629] 0 707629 4145 20 28672 0 0 exe [11501076.821363] [ 707639] 0 707639 4145 20 28672 0 0 exe [11501076.829825] [ 707642] 0 707642 4157 22 28672 0 0 exe [11501076.838296] [ 707645] 0 707645 4163 23 28672 0 0 exe [11501076.846756] [ 707647] 0 707647 4157 22 28672 0 0 exe [11501076.855229] [ 707673] 0 707673 104233 69238 839680 0 0 exe [11501076.863696] [ 707674] 0 707674 104233 69238 839680 0 0 exe [11501076.872171] [ 707737] 0 707737 4151 21 36864 0 0 exe [11501076.880728] [ 707767] 0 707767 4139 18 36864 0 0 exe [11501076.889203] [ 707865] 0 707865 104233 69238 839680 0 0 exe [11501076.897678] [ 707880] 0 707880 4163 23 28672 0 0 exe [11501076.906152] [ 707892] 0 707892 4145 20 28672 0 0 exe [11501076.914626] [ 707894] 0 707894 4151 21 28672 0 0 exe [11501076.923091] [ 707895] 0 707895 4151 21 28672 0 0 exe [11501076.931553] [ 707918] 0 707918 4151 21 36864 0 0 exe [11501076.940018] [ 707932] 0 707932 4151 21 28672 0 0 exe [11501076.948489] [ 707945] 0 707945 104233 69238 839680 0 0 exe [11501076.956950] [ 707946] 0 707946 4169 24 28672 0 0 exe [11501076.965435] [ 708048] 0 708048 103587 69076 823296 0 0 exe [11501076.973908] [ 708050] 0 708050 378371 9362 405504 0 0 image [11501076.982563] [ 708062] 0 708062 396517 8802 405504 0 0 image [11501076.991315] [ 708073] 0 708073 454343 9223 462848 0 0 exe [11501076.999779] [ 708074] 0 708074 892728 23414 802816 0 0 exe [11501077.008256] [ 708087] 0 708087 21927 8234 204800 0 0 exe [11501077.016718] [ 708127] 0 708127 886 1 53248 0 0 exe [11501077.025191] [ 708153] 0 708153 914 1 65536 0 0 exe [11501077.033670] [ 708157] 0 708157 1 1 12288 0 0 exe [11501077.042136] [ 708163] 0 708163 4151 21 28672 0 0 exe [11501077.050601] [ 708172] 0 708172 28483 2806 233472 0 0 exe [11501077.059067] [ 708195] 0 708195 165 1 36864 0 0 exe [11501077.067543] [ 708316] 0 708316 395081 7855 389120 0 0 image [11501077.076185] [ 708322] 0 708322 358183 6893 372736 0 0 image [11501077.084822] [ 708344] 0 708344 415658 7492 421888 0 0 exe [11501077.093295] [ 708346] 0 708346 452492 8686 430080 0 0 exe [11501077.101762] [ 708347] 0 708347 1773053 207081 3670016 0 0 exe [11501077.110242] [ 708350] 0 708350 3679765 380667 14757888 0 0 exe [11501077.118713] [ 708402] 0 708402 1 1 12288 0 0 exe [11501077.127180] [ 708403] 0 708403 1 1 12288 0 0 exe [11501077.135644] [ 708430] 0 708430 28329 2852 237568 0 0 exe [11501077.144115] [ 708434] 0 708434 28208 3241 237568 0 0 exe [11501077.152585] [ 708477] 0 708477 4157 22 28672 0 0 exe [11501077.161049] [ 708479] 0 708479 4157 22 28672 0 0 exe [11501077.169537] [ 708494] 0 708494 357607 5946 356352 0 0 image [11501077.178188] [ 708497] 0 708497 339174 5911 344064 0 0 image [11501077.186828] [ 708521] 0 708521 40122 11821 315392 0 0 exe [11501077.195389] [ 708525] 0 708525 123232 88652 905216 0 0 exe [11501077.203860] [ 708571] 0 708571 620 1 49152 0 0 exe [11501077.212326] [ 708582] 0 708582 507 1 49152 0 0 exe [11501077.220792] [ 708640] 0 708640 578 114 49152 0 0 exe [11501077.229266] [ 708648] 0 708648 570 1 61440 0 0 exe [11501077.237729] [ 708654] 0 708654 606 1 57344 0 0 exe [11501077.246192] [ 708656] 0 708656 722 1 45056 0 0 exe [11501077.254656] [ 708667] 0 708667 785 1 57344 0 0 exe [11501077.263135] [ 708679] 0 708679 400 1 53248 0 0 exe [11501077.271603] [ 708696] 0 708696 457 1 65536 0 0 exe [11501077.280069] [ 708704] 0 708704 4157 22 36864 0 0 exe [11501077.288549] [ 708754] 0 708754 1 1 12288 0 0 exe [11501077.297017] [ 708755] 0 708755 1 1 12288 0 0 exe [11501077.305496] [ 708765] 0 708765 1 1 12288 0 0 exe [11501077.313994] [ 708816] 0 708816 1 1 12288 0 0 exe [11501077.322459] [ 709163] 0 709163 4157 22 36864 0 0 exe [11501077.330923] [ 709215] 0 709215 4151 21 28672 0 0 exe [11501077.339385] [ 709233] 0 709233 403 129 53248 0 0 exe [11501077.347869] [ 709237] 0 709237 683 1 61440 0 0 exe [11501077.356334] [ 709242] 0 709242 4151 21 28672 0 0 exe [11501077.364799] [ 709241] 0 709241 455 1 65536 0 0 exe [11501077.373276] [ 709244] 0 709244 551 1 53248 0 0 exe [11501077.381742] [ 709255] 0 709255 614 1 65536 0 0 exe [11501077.390219] [ 709264] 0 709264 418 1 53248 0 0 exe [11501077.398713] [ 709276] 0 709276 422 1 65536 0 0 exe [11501077.407236] [ 709296] 0 709296 1 1 12288 0 0 exe [11501077.415731] [ 709307] 0 709307 2260 1 77824 0 0 exe [11501077.424214] [ 709318] 0 709318 210 1 40960 0 0 exe [11501077.432685] [ 709322] 0 709322 1 1 12288 0 0 exe [11501077.441163] [ 709602] 0 709602 1 1 12288 0 0 exe [11501077.449638] [ 709612] 0 709612 1 1 12288 0 0 exe [11501077.458115] [ 709762] 0 709762 1 1 12288 0 0 exe [11501077.466588] [ 709787] 0 709787 1 1 12288 0 0 exe [11501077.475062] [ 709954] 0 709954 4151 21 36864 0 0 exe [11501077.483567] [ 709955] 0 709955 4151 21 36864 0 0 exe [11501077.492063] [ 709965] 0 709965 4151 21 36864 0 0 exe [11501077.500534] [ 710095] 0 710095 4157 22 28672 0 0 exe [11501077.509024] [ 710098] 0 710098 4485 21 69632 0 0 exe [11501077.517502] [ 710106] 0 710106 7905 22 98304 0 0 exe [11501077.525976] [ 710107] 0 710107 7905 22 98304 0 0 exe [11501077.534456] [ 710108] 0 710108 7905 22 98304 0 0 exe [11501077.542942] [ 710118] 0 710118 7905 22 98304 0 0 exe [11501077.551414] [ 710124] 0 710124 4163 23 28672 0 0 exe [11501077.559888] [ 710211] 0 710211 4151 21 36864 0 0 exe [11501077.569058] [ 710214] 0 710214 4151 21 36864 0 0 exe [11501077.577557] [ 710215] 0 710215 4151 21 36864 0 0 exe [11501077.586030] [ 710282] 0 710282 4151 21 28672 0 0 exe [11501077.594506] [ 710439] 0 710439 4157 22 28672 0 0 exe [11501077.602999] [ 710529] 0 710529 4151 21 36864 0 0 exe [11501077.611487] [ 710537] 0 710537 4151 21 36864 0 0 exe [11501077.620074] [ 710680] 0 710680 4133 16 28672 0 0 exe [11501077.628566] [ 710681] 0 710681 4133 16 28672 0 0 exe [11501077.637050] [ 710682] 0 710682 4133 16 28672 0 0 exe [11501077.645531] [ 710683] 0 710683 4133 16 28672 0 0 exe [11501077.654005] [ 710684] 0 710684 14637 9744 167936 0 0 exe [11501077.662481] [ 710685] 0 710685 14637 9744 167936 0 0 exe [11501077.670979] [ 710686] 0 710686 4133 16 28672 0 0 exe [11501077.679484] [ 710687] 0 710687 4133 16 28672 0 0 exe [11501077.687979] [ 710688] 0 710688 4133 16 28672 0 0 exe [11501077.696461] [ 710689] 0 710689 4133 16 28672 0 0 exe [11501077.704949] [ 710690] 0 710690 4139 19 28672 0 0 exe [11501077.713432] [ 710691] 0 710691 4139 19 28672 0 0 exe [11501077.721910] [ 710693] 0 710693 4133 16 28672 0 0 exe [11501077.730391] [ 710694] 0 710694 4133 16 28672 0 0 exe [11501077.738976] [ 710701] 0 710701 4133 16 28672 0 0 exe [11501077.747472] [ 710702] 0 710702 4133 16 28672 0 0 exe [11501077.755953] [ 710703] 0 710703 4133 16 28672 0 0 exe [11501077.764419] [ 710704] 0 710704 4133 16 28672 0 0 exe [11501077.772881] [ 710710] 0 710710 14637 9744 167936 0 0 exe [11501077.781361] [ 710716] 0 710716 4151 21 28672 0 0 exe [11501077.789831] [ 710719] 0 710719 4151 21 28672 0 0 exe [11501077.798295] [ 710722] 0 710722 4139 19 28672 0 0 exe [11501077.806759] [ 710723] 0 710723 4151 21 28672 0 0 exe [11501077.815220] [ 710725] 0 710725 4151 21 28672 0 0 exe [11501077.823678] [ 710727] 0 710727 4151 21 28672 0 0 exe [11501077.832144] [ 710728] 0 710728 4151 21 28672 0 0 exe [11501077.840607] [ 710729] 0 710729 4151 21 28672 0 0 exe [11501077.849085] [ 710745] 0 710745 14637 9744 167936 0 0 exe [11501077.857553] [ 710750] 0 710750 6981 22 98304 0 0 exe [11501077.866036] [ 710751] 0 710751 6981 22 98304 0 0 exe [11501077.874585] [ 710752] 0 710752 6981 22 98304 0 0 exe [11501077.883138] [ 710761] 0 710761 4157 22 36864 0 0 exe [11501077.891604] [ 710767] 0 710767 1 1 12288 0 0 exe [11501077.900084] [ 710849] 0 710849 1 1 12288 0 0 exe [11501077.908637] [ 710856] 0 710856 1 1 12288 0 0 exe [11501077.917110] [ 710946] 0 710946 6981 22 98304 0 0 exe [11501077.925580] [ 710997] 0 710997 4151 21 36864 0 0 exe [11501077.934065] [ 710999] 0 710999 1 1 12288 0 0 exe [11501077.942538] [ 711023] 0 711023 4157 22 28672 0 0 exe [11501077.951010] [ 711077] 0 711077 1 1 12288 0 0 exe [11501077.959471] [ 711147] 0 711147 4151 21 28672 0 0 exe [11501077.968033] [ 711197] 0 711197 36822 20338 352256 0 0 exe [11501077.976535] [ 711198] 0 711198 36822 20338 352256 0 0 exe [11501077.985004] [ 711257] 0 711257 1 1 12288 0 0 exe [11501077.993479] [ 711295] 0 711295 1 1 12288 0 0 exe [11501078.001940] [ 711299] 0 711299 1 1 12288 0 0 exe [11501078.010413] [ 711468] 0 711468 4145 19 36864 0 0 exe [11501078.018974] [ 711470] 0 711470 4151 21 36864 0 0 exe [11501078.027438] [ 711471] 0 711471 4151 21 36864 0 0 exe [11501078.035905] [ 711473] 0 711473 4151 21 36864 0 0 exe [11501078.044376] [ 711688] 0 711688 4539 20 81920 0 0 exe [11501078.052849] [ 711708] 0 711708 4133 16 36864 0 0 exe [11501078.061405] [ 711709] 0 711709 4133 16 36864 0 0 exe [11501078.069878] [ 711710] 0 711710 4133 16 36864 0 0 exe [11501078.080285] [ 711711] 0 711711 4133 16 36864 0 0 exe [11501078.088750] [ 711712] 0 711712 4133 16 36864 0 0 exe [11501078.097402] [ 711713] 0 711713 4133 16 36864 0 0 exe [11501078.106045] [ 711714] 0 711714 4133 16 36864 0 0 exe [11501078.114517] [ 711715] 0 711715 4133 16 36864 0 0 exe [11501078.122985] [ 711716] 0 711716 4133 16 36864 0 0 exe [11501078.131445] [ 711717] 0 711717 4133 16 36864 0 0 exe [11501078.139919] [ 711718] 0 711718 4139 18 36864 0 0 exe [11501078.148381] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=ci-gvisor-ptrace-2-race-0,mems_allowed=0-1,global_oom,task_memcg=/docker/565b2f6324c19684ac99270c00af3806c11bcfb36671d1672e739869b03c459b/ci-gvisor-ptrace-2-race-0,task=exe,pid=596070,uid=0 [11501078.172528] Out of memory: Killed process 596070 (exe) total-vm:230162228kB, anon-rss:60273056kB, file-rss:0kB, shmem-rss:106204kB, UID:0 pgtables:195412kB oom_score_adj:0 [11501080.296157] oom_reaper: reaped process 596070 (exe), now anon-rss:0kB, file-rss:0kB, shmem-rss:106436kB [11501754.366140] exe[658529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a95abee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11501754.484555] exe[660406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a95abee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11501754.484870] exe[661164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a958aee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11501755.194372] exe[692806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a95abee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11503371.018999] exe[758686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579f6a874b1 cs:33 sp:7f97aded2568 ax:8 si:1 di:7f97aded2660 [11503371.923508] exe[737086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579f6a874b1 cs:33 sp:7f97ade6f568 ax:8 si:1 di:7f97ade6f660 [11503372.768376] exe[736664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579f6a874b1 cs:33 sp:7f97ade6f568 ax:8 si:1 di:7f97ade6f660 [11504288.268234] exe[777225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a63aa40a cs:33 sp:7fcf032cdee8 ax:12 si:ffffffffff600000 di:5605a6416ff2 [11504288.352122] exe[777223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a63aa40a cs:33 sp:7fcf032cdee8 ax:12 si:ffffffffff600000 di:5605a6416ff2 [11504288.441650] exe[757296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a63aa40a cs:33 sp:7fcf032cdee8 ax:12 si:ffffffffff600000 di:5605a6416ff2 [11504621.904716] exe[796211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a8b65f839 cs:33 sp:7fe406e47858 ax:0 si:556a8b6b8062 di:ffffffffff600000 [11504621.981614] exe[789723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a8b65f839 cs:33 sp:7fe406e47858 ax:0 si:556a8b6b8062 di:ffffffffff600000 [11504622.759237] exe[789731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a8b65f839 cs:33 sp:7fe406e47858 ax:0 si:556a8b6b8062 di:ffffffffff600000 [11505491.464933] exe[789883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ae662839 cs:33 sp:7f98c11fe858 ax:0 si:5577ae6bb070 di:ffffffffff600000 [11505491.548172] exe[790005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ae662839 cs:33 sp:7f98c11fe858 ax:0 si:5577ae6bb070 di:ffffffffff600000 [11505491.715580] exe[811352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ae662839 cs:33 sp:7f98c11dd858 ax:0 si:5577ae6bb070 di:ffffffffff600000 [11505659.151999] exe[815668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11505659.318085] exe[815803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11505660.228695] exe[821101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11505660.235992] exe[821890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11510253.600538] exe[911074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fc7b05839 cs:33 sp:7fca74b5c858 ax:0 si:556fc7b5e070 di:ffffffffff600000 [11510253.709137] exe[902857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fc7b05839 cs:33 sp:7fca74b3b858 ax:0 si:556fc7b5e070 di:ffffffffff600000 [11510254.348250] exe[906187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fc7b05839 cs:33 sp:7fca74b3b858 ax:0 si:556fc7b5e070 di:ffffffffff600000 [11510872.370401] exe[926145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64934e40a cs:33 sp:7f1300575ee8 ax:12 si:ffffffffff600000 di:55e6493baff2 [11510872.771766] exe[927833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64934e40a cs:33 sp:7f1300554ee8 ax:12 si:ffffffffff600000 di:55e6493baff2 [11510872.943204] exe[926192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64934e40a cs:33 sp:7f1300575ee8 ax:12 si:ffffffffff600000 di:55e6493baff2 [11510999.751958] exe[907967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bd0ee8 ax:0 si:20000040 di:ffffffffff600000 [11510999.924400] exe[911510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bd0ee8 ax:0 si:20000040 di:ffffffffff600000 [11511000.076264] exe[911511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bd0ee8 ax:0 si:20000040 di:ffffffffff600000 [11511000.111989] exe[906693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bafee8 ax:0 si:20000040 di:ffffffffff600000 [11512793.987365] exe[921191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b7b858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512794.087920] exe[939206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b7b858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512794.151767] exe[977517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b7b858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512794.176921] exe[939173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b5a858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512860.478683] exe[969874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed36ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11512860.552871] exe[971457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed36ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11512860.552998] exe[969984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed15ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11512861.309913] exe[974643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed36ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11514238.765640] exe[7460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8fcf7ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:880000 [11514239.374632] exe[8458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8fcf7ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:880000 [11514239.858057] exe[7505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8fcf7ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:880000 [11514512.814000] exe[24936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55749d87e40a cs:33 sp:7f96337ceee8 ax:12 si:ffffffffff600000 di:55749d8eaff2 [11514512.907921] exe[14037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55749d87e40a cs:33 sp:7f96337adee8 ax:12 si:ffffffffff600000 di:55749d8eaff2 [11519731.203430] exe[126925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b194892839 cs:33 sp:7f53da6b4ee8 ax:0 si:20000040 di:ffffffffff600000 [11519731.310875] exe[114263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b194892839 cs:33 sp:7f53da6d5ee8 ax:0 si:20000040 di:ffffffffff600000 [11519731.434356] exe[121514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b194892839 cs:33 sp:7f53da6d5ee8 ax:0 si:20000040 di:ffffffffff600000 [11521050.468050] exe[151789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625ad3ea839 cs:33 sp:7ee0cbc79858 ax:0 si:5625ad443070 di:ffffffffff600000 [11521050.816659] exe[133675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab731d839 cs:33 sp:7fed37c89858 ax:0 si:563ab7376070 di:ffffffffff600000 [11521052.876932] exe[141940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b57d7c6839 cs:33 sp:7f2517e8c858 ax:0 si:55b57d81f070 di:ffffffffff600000 [11521121.894560] exe[100247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce8262c839 cs:33 sp:7f1da29be858 ax:0 si:55ce82685070 di:ffffffffff600000 [11521206.393726] exe[151927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9551b3839 cs:33 sp:7f6d018cf858 ax:0 si:55a95520c070 di:ffffffffff600000 [11521270.937146] exe[10392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602a7eaa839 cs:33 sp:7f1eda4ec858 ax:0 si:5602a7f03070 di:ffffffffff600000 [11521312.507336] exe[94102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559003f50839 cs:33 sp:7ecb85515858 ax:0 si:559003fa9070 di:ffffffffff600000 [11521338.796759] exe[135964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652b64f6839 cs:33 sp:7f039f6b2858 ax:0 si:5652b654f070 di:ffffffffff600000 [11521380.843392] exe[153631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597f964f839 cs:33 sp:7f1b8c470858 ax:0 si:5597f96a8070 di:ffffffffff600000 [11521402.164539] exe[123385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564167cd3839 cs:33 sp:7f53bfc2d858 ax:0 si:564167d2c070 di:ffffffffff600000 [11521536.814608] exe[137784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbf1a99839 cs:33 sp:7f2687496858 ax:0 si:55fbf1af2070 di:ffffffffff600000 [11521559.707748] exe[24637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac56ec7839 cs:33 sp:7fa4065d9858 ax:0 si:55ac56f20070 di:ffffffffff600000 [11521590.176758] exe[158447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb7147b839 cs:33 sp:7ec6cb761858 ax:0 si:55bb714d4070 di:ffffffffff600000 [11521594.000222] exe[161804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f46f158839 cs:33 sp:7efa4c19b858 ax:0 si:55f46f1b1070 di:ffffffffff600000 [11521881.436012] exe[129233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd3112e839 cs:33 sp:7f28838b1858 ax:0 si:55cd31187070 di:ffffffffff600000 [11524364.008585] exe[152947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4fd8840a cs:33 sp:7f08c41e0ee8 ax:12 si:ffffffffff600000 di:55ff4fdf4ff2 [11524364.122496] exe[197700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4fd8840a cs:33 sp:7f08c41bfee8 ax:12 si:ffffffffff600000 di:55ff4fdf4ff2 [11524364.207832] exe[153660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4fd8840a cs:33 sp:7f08c41e0ee8 ax:12 si:ffffffffff600000 di:55ff4fdf4ff2 [11524365.144861] exe[153371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.224043] exe[152947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.310128] exe[227186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.397432] exe[197824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.453863] exe[153103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.545041] exe[197814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.661035] exe[156974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524920.849310] warn_bad_vsyscall: 19 callbacks suppressed [11524920.849313] exe[203744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b02df839 cs:33 sp:7ed9619e0858 ax:0 si:5606b0338097 di:ffffffffff600000 [11524920.918033] exe[203744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b02df839 cs:33 sp:7ed9619e0858 ax:0 si:5606b0338097 di:ffffffffff600000 [11524920.978520] exe[170729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b02df839 cs:33 sp:7ed9619e0858 ax:0 si:5606b0338097 di:ffffffffff600000 [11525389.297293] exe[263491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611ec858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525389.468776] exe[259136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611cb858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.090532] exe[258957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.118945] exe[258957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.145809] exe[261647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.173946] exe[259136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.202267] exe[258957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.229742] exe[259136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.259408] exe[261647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.293727] exe[261647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525474.213328] warn_bad_vsyscall: 25 callbacks suppressed [11525474.213332] exe[239910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573c08b3839 cs:33 sp:7fd11bd8f858 ax:0 si:5573c090c070 di:ffffffffff600000 [11525726.382681] exe[230121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e7c28839 cs:33 sp:7fba457dd858 ax:0 si:5628e7c81062 di:ffffffffff600000 [11525726.530717] exe[227463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e7c28839 cs:33 sp:7fba457bc858 ax:0 si:5628e7c81062 di:ffffffffff600000 [11525726.669907] exe[224897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e7c28839 cs:33 sp:7fba457bc858 ax:0 si:5628e7c81062 di:ffffffffff600000 [11527490.905451] exe[307905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eefee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11527491.013246] exe[279055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eefee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11527491.323215] exe[279641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eceee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11527491.323359] exe[281180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eefee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11528321.013618] exe[319222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56286cd9e40a cs:33 sp:7f0f570c0ee8 ax:12 si:ffffffffff600000 di:56286ce0aff2 [11528321.105322] exe[306490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56286cd9e40a cs:33 sp:7f0f570c0ee8 ax:12 si:ffffffffff600000 di:56286ce0aff2 [11528321.195354] exe[300252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56286cd9e40a cs:33 sp:7f0f570c0ee8 ax:12 si:ffffffffff600000 di:56286ce0aff2 [11528335.989506] exe[243987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176eea858 ax:0 si:5587dff80062 di:ffffffffff600000 [11528341.019150] exe[313012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176f2c858 ax:0 si:5587dff80062 di:ffffffffff600000 [11528341.259617] exe[313021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176f0b858 ax:0 si:5587dff80062 di:ffffffffff600000 [11528341.290134] exe[313019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176e24858 ax:0 si:5587dff80062 di:ffffffffff600000 [11530649.105531] exe[352415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911097 di:ffffffffff600000 [11530649.266359] exe[342771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911097 di:ffffffffff600000 [11530649.374392] exe[347653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911097 di:ffffffffff600000 [11530650.194492] exe[348004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.279713] exe[342938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.354752] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.419998] exe[347627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.485322] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.555924] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.631477] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.124495] warn_bad_vsyscall: 319 callbacks suppressed [11530654.124499] exe[346814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.173782] exe[342708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.217687] exe[350761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.256534] exe[346763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.301738] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.358451] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.421216] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.468018] exe[346814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.513829] exe[350761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.559543] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.371355] warn_bad_vsyscall: 277 callbacks suppressed [11530659.371358] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.693220] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.085260] exe[347627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.158793] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.193093] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f7e858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.299243] exe[360483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.334869] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.427124] exe[342702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.530670] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.552515] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530664.410846] warn_bad_vsyscall: 191 callbacks suppressed [11530664.410850] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.517388] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.614182] exe[343158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.693391] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.880133] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530665.104198] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.164041] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.189874] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.263975] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.325499] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11531647.091724] warn_bad_vsyscall: 119 callbacks suppressed [11531647.091728] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.193212] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.268456] exe[342979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.288424] exe[342975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.308161] exe[342944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.334261] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.355824] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.376295] exe[342993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.396210] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.417266] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11532345.155341] warn_bad_vsyscall: 25 callbacks suppressed [11532345.155345] exe[382188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.269530] exe[382766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.386757] exe[382474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532767.935456] exe[384598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.011945] exe[342758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.091418] exe[363806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11534667.144948] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.236329] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.267961] exe[403010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.372458] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.408027] exe[400419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534894.914638] exe[383063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beadbee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.957554] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.977138] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.997745] exe[383054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.019118] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.038723] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.059007] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.079097] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.098979] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.118890] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11535893.406581] warn_bad_vsyscall: 25 callbacks suppressed [11535893.406585] exe[518174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.458729] exe[498396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.521164] exe[517163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.575499] exe[517648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11536070.313225] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.380260] exe[515339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.442300] exe[515436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.505325] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536370.456183] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.586537] exe[514004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53fbc858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.694198] exe[527281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.737448] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11537650.136338] exe[430654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537650.412774] exe[548543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537651.379743] exe[544871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11539350.089743] exe[592292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fee1a62839 cs:33 sp:7f3bb8f66858 ax:0 si:55fee1abb062 di:ffffffffff600000 [11539649.231607] exe[597310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.290920] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.347494] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539977.040247] exe[600851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622cbba1839 cs:33 sp:7ef62f826858 ax:0 si:5622cbbfa070 di:ffffffffff600000 [11540511.026519] exe[600753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605abe9b839 cs:33 sp:7ea0b2c49858 ax:0 si:5605abef4062 di:ffffffffff600000 [11540577.627218] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.675057] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.720870] exe[580996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb450858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11541137.236749] exe[631001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8df4a8839 cs:33 sp:7ec367e7b858 ax:0 si:55d8df501070 di:ffffffffff600000 [11541804.084586] exe[636938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.009172] exe[573192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.193016] exe[624964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11542822.267208] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.447533] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.599315] exe[608247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.654857] exe[608085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff2b858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542974.046947] exe[681952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11542975.617308] exe[681959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdb6b73839 cs:33 sp:7ea1e721f858 ax:0 si:55bdb6bcc070 di:ffffffffff600000 [11543003.003275] exe[680745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f039ea839 cs:33 sp:7f52e9f8c858 ax:0 si:560f03a43070 di:ffffffffff600000 [11543004.857028] exe[674098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11543241.124326] exe[653510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543241.246077] exe[670164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543242.057149] exe[665681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543265.859323] exe[669905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.014563] exe[673318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.109923] exe[655556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.226266] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.340307] exe[666615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.438645] exe[653578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.550820] exe[653447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.639930] exe[668546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543527.564952] exe[682036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85dfee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.843021] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.872086] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.901814] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.928287] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.960260] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.001419] exe[686062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.037270] exe[686072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.072724] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.101714] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11544123.311129] warn_bad_vsyscall: 43 callbacks suppressed [11544123.311132] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.485832] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.545188] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.727586] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544124.057735] exe[696402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.305506] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.507382] exe[669629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.623230] exe[695057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.735692] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.863236] exe[665545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544128.352152] warn_bad_vsyscall: 20 callbacks suppressed [11544128.352155] exe[671775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544128.511425] exe[696712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.375128] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.536371] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.698008] exe[653586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.893888] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.031510] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.130359] exe[673044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.235880] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.352844] exe[672186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.353612] warn_bad_vsyscall: 24 callbacks suppressed [11544133.353615] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.473154] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.609419] exe[668533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.901016] exe[696718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.174452] exe[666489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.475583] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.623602] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.772637] exe[696477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.888566] exe[670834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.988750] exe[697893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544138.414937] warn_bad_vsyscall: 63 callbacks suppressed [11544138.414941] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.523964] exe[680995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.625852] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.629193] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.773793] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.889988] exe[671086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.995711] exe[656008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.279460] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.285732] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.852350] exe[702011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.530343] warn_bad_vsyscall: 21 callbacks suppressed [11544143.530346] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.650402] exe[651695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.841742] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.870995] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.902268] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.948343] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.989607] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.024048] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.054902] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.087224] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544148.632017] warn_bad_vsyscall: 172 callbacks suppressed [11544148.632020] exe[669150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.794259] exe[668957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.989109] exe[668900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.994476] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.214390] exe[700441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.375421] exe[677325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.743745] exe[651266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.292722] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.474228] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.637207] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544153.658144] warn_bad_vsyscall: 27 callbacks suppressed [11544153.658148] exe[653423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.777426] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.903906] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.947438] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.109460] exe[660365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.158525] exe[653490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.258820] exe[651422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.391447] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.603018] exe[653409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.651409] exe[653440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544158.817051] warn_bad_vsyscall: 88 callbacks suppressed [11544158.817054] exe[694623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.075950] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.301459] exe[696410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.392503] exe[694615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.536699] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.643218] exe[693490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.745653] exe[687494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.834437] exe[669163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544159.940422] exe[693510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544160.043187] exe[673283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.101141] warn_bad_vsyscall: 21 callbacks suppressed [11544164.101144] exe[668876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.241344] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.416813] exe[696415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.572347] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.661162] exe[700444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.764040] exe[665928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.860384] exe[665956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.967054] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.069729] exe[696446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.167820] exe[667801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.171621] warn_bad_vsyscall: 29 callbacks suppressed [11544169.171624] exe[666533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.209223] exe[694404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.345652] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.449276] exe[666863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.579999] exe[652022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.628929] exe[681862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.748025] exe[694768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.754710] exe[651361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544170.115853] exe[695045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544170.211267] exe[694614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544487.006009] warn_bad_vsyscall: 7 callbacks suppressed [11544487.006013] exe[698657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56475d423839 cs:33 sp:7f017362b858 ax:0 si:56475d47c070 di:ffffffffff600000 [11544487.270484] exe[700399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563181efe839 cs:33 sp:7ebe85da1858 ax:0 si:563181f57070 di:ffffffffff600000 [11544511.054844] exe[643613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55671700d839 cs:33 sp:7fda3ebc7858 ax:0 si:556717066070 di:ffffffffff600000 [11544534.538680] exe[711402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b2e68839 cs:33 sp:7ed2418f9858 ax:0 si:5650b2ec1070 di:ffffffffff600000 [11544541.236335] exe[714082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b7839 cs:33 sp:7f29fcf9d858 ax:0 si:563ec3210070 di:ffffffffff600000 [11544549.596877] exe[709232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85df858 ax:0 si:55f2a8264070 di:ffffffffff600000 [11544550.342713] exe[712067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd4032839 cs:33 sp:7fe3bd6b3858 ax:0 si:564cd408b070 di:ffffffffff600000 [11544636.437853] exe[540397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df21791839 cs:33 sp:7f199a286858 ax:0 si:55df217ea070 di:ffffffffff600000 [11544650.761105] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.648325] exe[680729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.692536] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.806399] exe[654057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544684.382904] exe[599414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f284d4839 cs:33 sp:7f961e482858 ax:0 si:556f2852d070 di:ffffffffff600000 [11544687.601444] exe[605347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557bb1bb839 cs:33 sp:7eccd13f5858 ax:0 si:5557bb214070 di:ffffffffff600000 [11545051.986254] exe[681960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11545064.270053] exe[698660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b51fb0839 cs:33 sp:7f9c7caaf858 ax:0 si:560b52009070 di:ffffffffff600000 [11545068.988305] exe[688573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928b3b839 cs:33 sp:7ff955622858 ax:0 si:564928b94070 di:ffffffffff600000 [11545109.002939] exe[700093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11545257.023788] exe[699969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858858 ax:0 si:56468e7be070 di:ffffffffff600000 [11545310.043985] exe[730419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079858 ax:0 si:559d6ffcd070 di:ffffffffff600000 [11545747.024880] exe[668885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.207869] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.208393] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.369587] exe[698981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.086072] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.276578] exe[655585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.440844] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.661991] exe[651380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.864051] exe[691659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.032545] exe[669495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.180256] exe[668971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.327971] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.464233] exe[653467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.608138] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.724053] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.821867] exe[673278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545752.940728] exe[695059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.257832] exe[690707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.288251] exe[694599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.081142] warn_bad_vsyscall: 180 callbacks suppressed [11545757.081146] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.214468] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.680818] exe[660360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545757.976248] exe[669152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.152711] exe[673009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db06858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.411760] exe[666512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.527446] exe[666632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.650734] exe[670178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.653643] exe[696363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.792891] exe[666858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.314186] warn_bad_vsyscall: 20 callbacks suppressed [11545762.314189] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.467684] exe[670066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.649946] exe[673641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.943504] exe[660379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.043408] exe[669128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.327908] exe[669526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.366578] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.522288] exe[669522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.352902] exe[696365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.927217] exe[668856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.329883] warn_bad_vsyscall: 19 callbacks suppressed [11545767.329886] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.356567] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.513570] exe[697884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.562772] exe[670199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.711961] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.846666] exe[673281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.887751] exe[673284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.020071] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.057366] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.194079] exe[677299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545895.545245] warn_bad_vsyscall: 20 callbacks suppressed [11545895.545249] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.697993] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.785536] exe[721585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c837ee8 ax:0 si:200001c0 di:ffffffffff600000 [11546263.751083] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.760352] exe[750487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cd5eee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.909919] exe[733995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546785.957834] exe[722877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546786.864503] exe[719747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546787.823769] exe[718998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11547088.502200] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.547606] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.594335] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.508654] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.559999] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.608707] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.659695] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.718362] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.781423] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.831867] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.888097] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.977889] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547100.030632] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547104.513495] warn_bad_vsyscall: 291 callbacks suppressed [11547104.513499] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.539086] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.559309] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.578791] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.599547] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.620080] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.640504] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.659820] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.679561] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.700181] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547109.524219] warn_bad_vsyscall: 177 callbacks suppressed [11547109.524223] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.571444] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.623374] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.666991] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.687953] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.739406] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.781901] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.828639] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.849421] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.897272] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.703281] warn_bad_vsyscall: 176 callbacks suppressed [11547226.703285] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.750753] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.799595] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.236010] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.275452] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.317150] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.312120] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.354274] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.397972] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.426494] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.481647] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.534048] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547286.183628] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.224975] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.249969] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.292623] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547292.084095] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.127160] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.168264] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.584508] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.638463] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.658311] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.678417] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.699893] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.719994] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.740570] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.761543] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.782276] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.803395] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.755488] warn_bad_vsyscall: 32 callbacks suppressed [11547304.755491] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.820801] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.870285] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547305.231833] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.080890] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.932040] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.868022] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.927403] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.983135] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547309.035076] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.512279] warn_bad_vsyscall: 3 callbacks suppressed [11547312.512283] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.573549] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.593042] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.613765] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.634451] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.654831] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.674844] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.695789] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.716034] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.735650] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.072811] warn_bad_vsyscall: 25 callbacks suppressed [11547323.072814] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.126130] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.168909] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.169422] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.577119] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.618137] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.659742] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.430811] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.470418] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.471364] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.540794] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.575387] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.234296] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.287869] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.341084] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.150024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.197367] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.613691] warn_bad_vsyscall: 1 callbacks suppressed [11547359.613695] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.673012] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.722811] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.747468] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.889779] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.945222] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.980565] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547371.026574] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547381.799394] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.864307] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.906009] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.933118] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547384.896734] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547384.942724] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547385.004823] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547394.986983] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.029433] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.072479] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.899409] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.945764] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.998894] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547402.412281] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.457209] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.458646] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539688] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539824] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547414.727517] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.524355] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.575392] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.624984] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.681183] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.722741] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.761925] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.879392] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.921135] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.960705] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.692664] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.746736] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.780646] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.157398] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.227524] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.267610] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.241019] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.314637] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.354549] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.400116] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.441352] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.461983] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.499263] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.711900] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.766945] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.815670] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.678890] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.727877] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.747719] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.767929] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.788113] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.807588] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.826881] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.107205] warn_bad_vsyscall: 63 callbacks suppressed [11547478.107208] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.164816] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.204636] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.384520] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.441631] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.483337] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.658315] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547498.516799] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.368994] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.390429] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.411047] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.430939] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.452865] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.945209] warn_bad_vsyscall: 28 callbacks suppressed [11547504.945212] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.998022] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547505.038001] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.867524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.912298] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.955068] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.977045] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547536.142402] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.183582] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.217323] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.569508] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.614546] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.663836] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547538.951959] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.000244] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.081981] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.997217] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.887928] warn_bad_vsyscall: 69 callbacks suppressed [11547564.887932] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.979509] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.178943] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.229576] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.296841] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.055098] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.108833] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.156638] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.185291] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.306678] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.358066] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.406256] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.036059] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.086889] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.108968] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.156744] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.880353] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.931926] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.953668] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.989459] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.559099] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.600969] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.648685] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.670795] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.298350] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.336522] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.375194] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547619.302393] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.356222] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.395199] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547628.124097] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.175121] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.195646] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.242715] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.055190] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.102818] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.146651] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.408345] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.450251] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.489444] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.515277] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.494419] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.543322] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.564399] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.602948] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.605910] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.679150] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.726624] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547662.729392] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.772014] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.817232] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547666.997387] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.036554] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.076179] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.948193] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.996557] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.038514] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.039086] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547673.715197] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.774874] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.796267] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.836633] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547696.173266] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.232828] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.255864] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.294590] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.314254] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.335246] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.355631] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.376818] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.396933] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.417149] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.297493] warn_bad_vsyscall: 65 callbacks suppressed [11547715.297496] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.351733] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.396006] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.417741] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.369570] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.412168] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.433703] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.476531] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.185928] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.229580] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.267114] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.034535] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.079956] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.081096] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.142656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.827814] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.871810] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.895490] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.935407] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.937018] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.115105] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.155340] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.179243] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.226345] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.556996] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.594141] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.641491] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.738092] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.785040] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.827300] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.849354] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.631390] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.672124] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.713813] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.715026] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.110481] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.167223] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.188945] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.209538] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.229116] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.248124] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547785.250849] warn_bad_vsyscall: 39 callbacks suppressed [11547785.250853] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.017175] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.058414] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.098809] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.452423] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.491354] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.530741] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.157406] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.405882] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.569025] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.689830] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.730995] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.770001] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.771515] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547812.197802] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.267933] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.268869] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547813.941768] warn_bad_vsyscall: 5 callbacks suppressed [11547813.941772] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547813.985351] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.023826] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.283366] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.373377] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.430322] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.428583] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.479106] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.517226] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547821.217341] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.304135] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.358901] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.381326] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.403008] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.917629] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547822.010021] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.374491] warn_bad_vsyscall: 6 callbacks suppressed [11547838.374495] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.433268] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.487754] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.517159] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.542981] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.594031] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.633861] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547847.990984] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.047899] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.090172] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.278529] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.318322] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.357865] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.656438] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.696366] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.730899] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547851.240037] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.042222] warn_bad_vsyscall: 2 callbacks suppressed [11547866.042225] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.098981] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.161778] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.079020] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.130030] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.184976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.225662] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.268419] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.320362] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.047221] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.096888] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.137370] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.386318] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.432437] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.486510] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547884.683356] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.762816] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.813991] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.189876] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.254562] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.293397] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547903.407887] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.447383] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.470252] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.506155] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.721533] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.782550] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.820577] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.096045] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.142337] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.161621] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547911.216020] warn_bad_vsyscall: 64 callbacks suppressed [11547911.216024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.267332] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.307191] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547912.057581] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.095772] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.097086] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.157993] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547913.388972] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.423889] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.465344] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547924.521450] warn_bad_vsyscall: 5 callbacks suppressed [11547924.521454] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.577796] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.602125] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.641611] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.133391] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.194823] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.197273] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.263427] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.418619] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.475719] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.543133] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.125423] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.228337] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.688513] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.730652] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.766521] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.807188] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.851432] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.871960] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.914064] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.259541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.337004] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.398917] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.978258] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.026688] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.029306] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.092103] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.100263] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.144346] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.174814] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.211169] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.832995] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.876208] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.898352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.934693] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.414771] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.456497] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.496767] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.291929] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.329604] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.369969] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.372328] warn_bad_vsyscall: 3 callbacks suppressed [11547989.372332] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.421337] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.465823] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.485942] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.841813] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.890432] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.943125] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.261522] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.301370] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.342764] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.299293] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.345532] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.381167] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.818109] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.874942] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.929681] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548017.498804] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.546061] exe[755951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.589351] exe[755959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.635935] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dfd5ee8 ax:0 si:20000680 di:ffffffffff600000 [11548019.396684] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.444824] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.480770] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.067924] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.105876] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.106597] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.730218] warn_bad_vsyscall: 5 callbacks suppressed [11548023.730221] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.775332] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.815656] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.219256] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.300235] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.347676] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.947538] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.999970] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.040895] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.069553] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.004537] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.049080] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.113890] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.137352] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548077.206282] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.251934] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.274716] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.295013] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.315325] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.336012] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.357843] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.377872] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.398283] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.418613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548097.528517] warn_bad_vsyscall: 57 callbacks suppressed [11548097.528521] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.576429] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.633295] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.634854] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.133965] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.176503] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.214588] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.215240] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.412752] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.462777] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548104.996660] warn_bad_vsyscall: 1 callbacks suppressed [11548104.996663] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548105.850076] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548106.696238] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.157724] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.208597] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.261372] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.343202] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.382779] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.426112] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.403368] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.452789] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.499910] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.417742] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.522190] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.936100] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.988256] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.016505] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.070003] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.445818] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.511715] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.553978] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.286390] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.334009] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.375931] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548175.546300] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.589700] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.629037] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.651488] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548179.585264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.631159] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.650585] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.670448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.691290] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.711967] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.732380] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.752068] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.772801] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.793448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.872059] warn_bad_vsyscall: 61 callbacks suppressed [11548193.872063] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.952821] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.928684] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.996448] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548202.037007] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.156027] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.196959] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.219143] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.258912] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.281350] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.546657] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.589787] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.627425] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.699725] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.745535] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.788742] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.471018] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.514946] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.515574] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.585099] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.038187] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.079907] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.127070] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.182158] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.221914] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.242963] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.281592] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.367833] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.410279] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.431732] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.485658] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.287473] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.328228] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.378594] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.674482] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.723577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.769676] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.411340] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000