5:18.376115 345766 task_signals.go:204] [ 598: 601] Signal 598, PID: 601, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.376124 345766 task_signals.go:204] [ 598: 602] Signal 598, PID: 602, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.376146 345766 task_signals.go:204] [ 598: 599] Signal 598, PID: 599, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.376136 345766 task_signals.go:204] [ 598: 603] Signal 598, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.376162 345766 task_exit.go:204] [ 598: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.376190 345766 task_signals.go:204] [ 598: 600] Signal 598, PID: 600, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.376203 345766 task_exit.go:204] [ 598: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.376208 345766 task_exit.go:204] [ 598: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.376220 345766 task_exit.go:204] [ 598: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.376233 345766 task_exit.go:204] [ 598: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.376244 345766 task_exit.go:204] [ 598: 602] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.376253 345766 task_exit.go:204] [ 598: 599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.376263 345766 task_exit.go:204] [ 598: 599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.376267 345766 task_exit.go:204] [ 598: 599] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.376274 345766 task_exit.go:204] [ 598: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.376279 345766 task_exit.go:204] [ 598: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.376283 345766 task_exit.go:204] [ 598: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.376290 345766 task_exit.go:204] [ 598: 600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.377477 345766 task_exit.go:204] [ 598: 600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.377499 345766 task_exit.go:204] [ 598: 600] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.377510 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.377543 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.377549 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.377642 345766 task_exit.go:204] [ 598: 598] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.377693 345766 task_signals.go:470] [ 6: 19] Notified of signal 23 D0713 08:45:18.377731 345766 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0713 08:45:18.379092 345766 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.380408 345766 syscalls.go:262] [ 604: 604] Allocating stack with size of 8388608 bytes D0713 08:45:18.380535 345766 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.381541 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.381625 345766 usertrap_amd64.go:106] [ 604: 604] Map a usertrap vma at 60000 D0713 08:45:18.381725 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 1 D0713 08:45:18.381766 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:18.382188 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.382211 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 2 D0713 08:45:18.382220 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:18.382824 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.382845 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 3 D0713 08:45:18.382854 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:18.387832 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.387859 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 4 D0713 08:45:18.387868 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:18.389021 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.389044 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 5 D0713 08:45:18.389052 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:18.389102 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.389113 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 6 D0713 08:45:18.389118 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:18.389494 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.389523 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 7 D0713 08:45:18.389535 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:18.389694 345766 usertrap_amd64.go:212] [ 604: 605] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.389716 345766 usertrap_amd64.go:122] [ 604: 605] Allocate a new trap: 0xc00150f950 8 D0713 08:45:18.389725 345766 usertrap_amd64.go:225] [ 604: 605] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:18.389909 345766 usertrap_amd64.go:212] [ 604: 605] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.389927 345766 usertrap_amd64.go:122] [ 604: 605] Allocate a new trap: 0xc00150f950 9 D0713 08:45:18.389933 345766 usertrap_amd64.go:225] [ 604: 605] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:18.389942 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.389949 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 10 D0713 08:45:18.389957 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:18.390659 345766 usertrap_amd64.go:212] [ 604: 605] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.390686 345766 usertrap_amd64.go:122] [ 604: 605] Allocate a new trap: 0xc00150f950 11 D0713 08:45:18.390694 345766 usertrap_amd64.go:225] [ 604: 605] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:18.390841 345766 usertrap_amd64.go:212] [ 604: 605] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.390858 345766 usertrap_amd64.go:122] [ 604: 605] Allocate a new trap: 0xc00150f950 12 D0713 08:45:18.390872 345766 usertrap_amd64.go:225] [ 604: 605] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:18.390903 345766 task_signals.go:470] [ 604: 604] Notified of signal 23 D0713 08:45:18.390926 345766 task_signals.go:220] [ 604: 604] Signal 23: delivering to handler D0713 08:45:18.396920 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.396932 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 13 D0713 08:45:18.396962 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:18.401090 345766 task_signals.go:470] [ 604: 604] Notified of signal 23 D0713 08:45:18.401155 345766 task_signals.go:220] [ 604: 604] Signal 23: delivering to handler D0713 08:45:18.401222 345766 task_signals.go:470] [ 604: 604] Notified of signal 23 D0713 08:45:18.402781 345766 task_signals.go:220] [ 604: 604] Signal 23: delivering to handler I0713 08:45:18.406431 345766 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0713 08:45:18.406521 345766 usertrap_amd64.go:212] [ 604: 604] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.406545 345766 usertrap_amd64.go:122] [ 604: 604] Allocate a new trap: 0xc00150f950 14 D0713 08:45:18.406558 345766 usertrap_amd64.go:225] [ 604: 604] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:18.406621 345766 task_exit.go:204] [ 604: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.406648 345766 task_exit.go:204] [ 604: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.406672 345766 task_signals.go:204] [ 604: 608] Signal 604, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.406681 345766 task_exit.go:204] [ 604: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.406671 345766 task_signals.go:204] [ 604: 606] Signal 604, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.406686 345766 task_exit.go:204] [ 604: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.406702 345766 task_exit.go:204] [ 604: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.406752 345766 task_signals.go:204] [ 604: 605] Signal 604, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.406794 345766 task_exit.go:204] [ 604: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.406785 345766 task_signals.go:204] [ 604: 607] Signal 604, PID: 607, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.406812 345766 task_exit.go:204] [ 604: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.406819 345766 task_exit.go:204] [ 604: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.406837 345766 task_exit.go:204] [ 604: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.406879 345766 task_exit.go:204] [ 604: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.406890 345766 task_exit.go:204] [ 604: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.406906 345766 task_exit.go:204] [ 604: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.408181 345766 task_exit.go:204] [ 604: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.408206 345766 task_exit.go:204] [ 604: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.408228 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.408256 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.408276 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.408412 345766 task_exit.go:204] [ 604: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.408500 345766 task_signals.go:470] [ 6: 14] Notified of signal 23 D0713 08:45:18.408532 345766 task_signals.go:179] [ 6: 14] Restarting syscall 202: interrupted by signal 23 D0713 08:45:18.408547 345766 task_signals.go:220] [ 6: 14] Signal 23: delivering to handler D0713 08:45:18.409065 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.410512 345766 syscalls.go:262] [ 609: 609] Allocating stack with size of 8388608 bytes D0713 08:45:18.410760 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.411624 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.411666 345766 usertrap_amd64.go:106] [ 609: 609] Map a usertrap vma at 67000 D0713 08:45:18.411754 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 1 D0713 08:45:18.411796 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:18.412192 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.412258 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 2 D0713 08:45:18.412276 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:18.412987 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.413021 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 3 D0713 08:45:18.413032 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:18.419063 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.419162 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 4 D0713 08:45:18.419183 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:18.420976 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.421032 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 5 D0713 08:45:18.421049 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:18.421109 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.421115 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 6 D0713 08:45:18.421126 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:18.421408 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.421429 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 7 D0713 08:45:18.421435 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:18.421582 345766 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.421594 345766 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc001472b10 8 D0713 08:45:18.421603 345766 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:18.421832 345766 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.421861 345766 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc001472b10 9 D0713 08:45:18.421870 345766 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:18.421936 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.421953 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 10 D0713 08:45:18.421958 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:18.428784 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.428815 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 11 D0713 08:45:18.428827 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:18.432541 345766 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.432578 345766 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc001472b10 12 D0713 08:45:18.432587 345766 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:18.432625 345766 usertrap_amd64.go:212] [ 609: 610] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.432630 345766 usertrap_amd64.go:122] [ 609: 610] Allocate a new trap: 0xc001472b10 13 D0713 08:45:18.432634 345766 usertrap_amd64.go:225] [ 609: 610] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:18.432646 345766 task_signals.go:470] [ 609: 609] Notified of signal 23 D0713 08:45:18.432720 345766 task_signals.go:220] [ 609: 609] Signal 23: delivering to handler I0713 08:45:18.441697 345766 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0713 08:45:18.441777 345766 usertrap_amd64.go:212] [ 609: 609] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.441786 345766 usertrap_amd64.go:122] [ 609: 609] Allocate a new trap: 0xc001472b10 14 D0713 08:45:18.441793 345766 usertrap_amd64.go:225] [ 609: 609] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:18.441820 345766 task_exit.go:204] [ 609: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.441858 345766 task_exit.go:204] [ 609: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.441878 345766 task_signals.go:204] [ 609: 612] Signal 609, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.441883 345766 task_signals.go:204] [ 609: 613] Signal 609, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.441897 345766 task_signals.go:204] [ 609: 610] Signal 609, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.441915 345766 task_exit.go:204] [ 609: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.442007 345766 task_signals.go:204] [ 609: 611] Signal 609, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.442049 345766 task_exit.go:204] [ 609: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.442064 345766 task_exit.go:204] [ 609: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.442087 345766 task_exit.go:204] [ 609: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.442109 345766 task_exit.go:204] [ 609: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.442123 345766 task_exit.go:204] [ 609: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.442140 345766 task_exit.go:204] [ 609: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.442202 345766 task_exit.go:204] [ 609: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.442216 345766 task_exit.go:204] [ 609: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.442227 345766 task_exit.go:204] [ 609: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.443952 345766 task_exit.go:204] [ 609: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.443977 345766 task_exit.go:204] [ 609: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.443989 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.444019 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.444042 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.444187 345766 task_exit.go:204] [ 609: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.444892 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.446461 345766 syscalls.go:262] [ 614: 614] Allocating stack with size of 8388608 bytes D0713 08:45:18.446553 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.448108 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.448136 345766 usertrap_amd64.go:106] [ 614: 614] Map a usertrap vma at 69000 D0713 08:45:18.448276 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 1 D0713 08:45:18.448309 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:18.448850 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.448867 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 2 D0713 08:45:18.448873 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:18.449660 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.449686 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 3 D0713 08:45:18.449694 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:18.456248 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.456279 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 4 D0713 08:45:18.456290 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:18.457746 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.457789 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 5 D0713 08:45:18.457809 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:18.457882 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.457895 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 6 D0713 08:45:18.457902 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:18.458279 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.458296 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 7 D0713 08:45:18.458303 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:18.458441 345766 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.458465 345766 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0004184e0 8 D0713 08:45:18.458475 345766 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:18.458705 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.458725 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 9 D0713 08:45:18.458732 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:18.458765 345766 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.458786 345766 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0004184e0 10 D0713 08:45:18.458803 345766 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:18.465883 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.465907 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 11 D0713 08:45:18.465915 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:18.469534 345766 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.469560 345766 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0004184e0 12 D0713 08:45:18.469570 345766 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:18.469638 345766 usertrap_amd64.go:212] [ 614: 615] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.469669 345766 usertrap_amd64.go:122] [ 614: 615] Allocate a new trap: 0xc0004184e0 13 D0713 08:45:18.469682 345766 usertrap_amd64.go:225] [ 614: 615] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:18.469753 345766 task_signals.go:470] [ 614: 614] Notified of signal 23 D0713 08:45:18.469798 345766 task_signals.go:220] [ 614: 614] Signal 23: delivering to handler I0713 08:45:18.476036 345766 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0713 08:45:18.476145 345766 usertrap_amd64.go:212] [ 614: 614] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.476158 345766 usertrap_amd64.go:122] [ 614: 614] Allocate a new trap: 0xc0004184e0 14 D0713 08:45:18.476177 345766 usertrap_amd64.go:225] [ 614: 614] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:18.476259 345766 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.476291 345766 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.476325 345766 task_signals.go:204] [ 614: 617] Signal 614, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.476338 345766 task_signals.go:204] [ 614: 615] Signal 614, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.476348 345766 task_exit.go:204] [ 614: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.476349 345766 task_signals.go:204] [ 614: 618] Signal 614, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.476385 345766 task_exit.go:204] [ 614: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.476397 345766 task_exit.go:204] [ 614: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.476316 345766 task_signals.go:204] [ 614: 616] Signal 614, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.476423 345766 task_exit.go:204] [ 614: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.476430 345766 task_exit.go:204] [ 614: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.476436 345766 task_exit.go:204] [ 614: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.476445 345766 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.476477 345766 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.476498 345766 task_exit.go:204] [ 614: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.476515 345766 task_exit.go:204] [ 614: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.477946 345766 task_exit.go:204] [ 614: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.477981 345766 task_exit.go:204] [ 614: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.477994 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.478041 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.478082 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.478183 345766 task_exit.go:204] [ 614: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.479055 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.480749 345766 syscalls.go:262] [ 619: 619] Allocating stack with size of 8388608 bytes D0713 08:45:18.480897 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.482218 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.482313 345766 usertrap_amd64.go:106] [ 619: 619] Map a usertrap vma at 62000 D0713 08:45:18.482425 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 1 D0713 08:45:18.482460 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:18.483050 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.483082 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 2 D0713 08:45:18.483094 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:18.483805 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.483825 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 3 D0713 08:45:18.483833 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:18.491178 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.491222 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 4 D0713 08:45:18.491238 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:18.492468 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.492499 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 5 D0713 08:45:18.492512 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:18.492552 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.492557 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 6 D0713 08:45:18.492563 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:18.492720 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.492735 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 7 D0713 08:45:18.492741 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:18.492863 345766 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.492870 345766 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc001472e40 8 D0713 08:45:18.492878 345766 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:18.493046 345766 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.493061 345766 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc001472e40 9 D0713 08:45:18.493073 345766 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:18.493155 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.493165 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 10 D0713 08:45:18.493177 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:18.500978 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.501008 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 11 D0713 08:45:18.501018 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:18.503554 345766 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.503585 345766 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc001472e40 12 D0713 08:45:18.503601 345766 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:18.503633 345766 usertrap_amd64.go:212] [ 619: 620] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.503642 345766 usertrap_amd64.go:122] [ 619: 620] Allocate a new trap: 0xc001472e40 13 D0713 08:45:18.503669 345766 usertrap_amd64.go:225] [ 619: 620] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:18.503731 345766 task_signals.go:470] [ 619: 619] Notified of signal 23 D0713 08:45:18.503811 345766 task_signals.go:220] [ 619: 619] Signal 23: delivering to handler I0713 08:45:18.512114 345766 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 08:45:18.512209 345766 usertrap_amd64.go:212] [ 619: 619] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.512217 345766 usertrap_amd64.go:122] [ 619: 619] Allocate a new trap: 0xc001472e40 14 D0713 08:45:18.512230 345766 usertrap_amd64.go:225] [ 619: 619] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:18.512257 345766 task_exit.go:204] [ 619: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.512270 345766 task_exit.go:204] [ 619: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.512292 345766 task_signals.go:204] [ 619: 620] Signal 619, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.512304 345766 task_signals.go:204] [ 619: 622] Signal 619, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.512319 345766 task_exit.go:204] [ 619: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.512326 345766 task_exit.go:204] [ 619: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.512337 345766 task_signals.go:204] [ 619: 621] Signal 619, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.512339 345766 task_exit.go:204] [ 619: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.512349 345766 task_exit.go:204] [ 619: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.512366 345766 task_exit.go:204] [ 619: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.512418 345766 task_signals.go:204] [ 619: 623] Signal 619, PID: 623, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.512443 345766 task_exit.go:204] [ 619: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.512464 345766 task_exit.go:204] [ 619: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.512479 345766 task_exit.go:204] [ 619: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.512485 345766 task_exit.go:204] [ 619: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.512494 345766 task_exit.go:204] [ 619: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.513753 345766 task_exit.go:204] [ 619: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.513776 345766 task_exit.go:204] [ 619: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.513793 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.513819 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.513836 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.513934 345766 task_exit.go:204] [ 619: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.514637 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.515804 345766 syscalls.go:262] [ 624: 624] Allocating stack with size of 8388608 bytes D0713 08:45:18.515961 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.517340 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.517382 345766 usertrap_amd64.go:106] [ 624: 624] Map a usertrap vma at 63000 D0713 08:45:18.517501 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 1 D0713 08:45:18.517520 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:18.517928 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.517955 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 2 D0713 08:45:18.517965 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:18.518481 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.518500 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 3 D0713 08:45:18.518507 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:18.524191 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.524223 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 4 D0713 08:45:18.524239 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:18.525731 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.525789 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 5 D0713 08:45:18.525814 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:18.525875 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.525891 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 6 D0713 08:45:18.525898 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:18.526253 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.526269 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 7 D0713 08:45:18.526276 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:18.526434 345766 usertrap_amd64.go:212] [ 624: 625] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.526455 345766 usertrap_amd64.go:122] [ 624: 625] Allocate a new trap: 0xc001472f60 8 D0713 08:45:18.526465 345766 usertrap_amd64.go:225] [ 624: 625] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:18.526807 345766 usertrap_amd64.go:212] [ 624: 625] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.526838 345766 usertrap_amd64.go:122] [ 624: 625] Allocate a new trap: 0xc001472f60 9 D0713 08:45:18.526850 345766 usertrap_amd64.go:225] [ 624: 625] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:18.526989 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.527025 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 10 D0713 08:45:18.527040 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:18.534379 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.534393 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 11 D0713 08:45:18.534402 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:18.537202 345766 usertrap_amd64.go:212] [ 624: 625] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.537257 345766 usertrap_amd64.go:122] [ 624: 625] Allocate a new trap: 0xc001472f60 12 D0713 08:45:18.537274 345766 usertrap_amd64.go:225] [ 624: 625] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:18.537343 345766 usertrap_amd64.go:212] [ 624: 625] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.537363 345766 usertrap_amd64.go:122] [ 624: 625] Allocate a new trap: 0xc001472f60 13 D0713 08:45:18.537371 345766 usertrap_amd64.go:225] [ 624: 625] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:18.537448 345766 task_signals.go:470] [ 624: 624] Notified of signal 23 D0713 08:45:18.537522 345766 task_signals.go:220] [ 624: 624] Signal 23: delivering to handler I0713 08:45:18.544365 345766 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 08:45:18.544438 345766 usertrap_amd64.go:212] [ 624: 624] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.544447 345766 usertrap_amd64.go:122] [ 624: 624] Allocate a new trap: 0xc001472f60 14 D0713 08:45:18.544455 345766 usertrap_amd64.go:225] [ 624: 624] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:18.544480 345766 task_exit.go:204] [ 624: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.544503 345766 task_exit.go:204] [ 624: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.544518 345766 task_signals.go:204] [ 624: 627] Signal 624, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.544514 345766 task_signals.go:204] [ 624: 626] Signal 624, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.544527 345766 task_exit.go:204] [ 624: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.544542 345766 task_signals.go:204] [ 624: 625] Signal 624, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.544541 345766 task_signals.go:204] [ 624: 628] Signal 624, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.544561 345766 task_exit.go:204] [ 624: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.544570 345766 task_exit.go:204] [ 624: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.544575 345766 task_exit.go:204] [ 624: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.544585 345766 task_exit.go:204] [ 624: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.544590 345766 task_exit.go:204] [ 624: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.544597 345766 task_exit.go:204] [ 624: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.544612 345766 task_exit.go:204] [ 624: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.544616 345766 task_exit.go:204] [ 624: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.544627 345766 task_exit.go:204] [ 624: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.545758 345766 task_exit.go:204] [ 624: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.545787 345766 task_exit.go:204] [ 624: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.545819 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.545851 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.545870 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.546021 345766 task_exit.go:204] [ 624: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.546398 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.546436 345766 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 08:45:18.547661 345766 syscalls.go:262] [ 629: 629] Allocating stack with size of 8388608 bytes D0713 08:45:18.547748 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.547896 345766 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 08:45:18.548902 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.548954 345766 usertrap_amd64.go:106] [ 629: 629] Map a usertrap vma at 66000 D0713 08:45:18.549053 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 1 D0713 08:45:18.549095 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:18.549415 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.549437 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 2 D0713 08:45:18.549445 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:18.549803 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.549822 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 3 D0713 08:45:18.549830 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:18.555170 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.555186 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 4 D0713 08:45:18.555199 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:18.556178 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.556201 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 5 D0713 08:45:18.556212 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:18.556278 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.556294 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 6 D0713 08:45:18.556305 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:18.556872 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.556902 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 7 D0713 08:45:18.556912 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:18.557050 345766 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.557060 345766 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc000851da0 8 D0713 08:45:18.557069 345766 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:18.557230 345766 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.557256 345766 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc000851da0 9 D0713 08:45:18.557267 345766 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:18.557279 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.557285 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 10 D0713 08:45:18.557293 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:18.564202 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.564224 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 11 D0713 08:45:18.564232 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:18.567761 345766 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.567788 345766 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc000851da0 12 D0713 08:45:18.567796 345766 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:18.567809 345766 usertrap_amd64.go:212] [ 629: 630] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.567814 345766 usertrap_amd64.go:122] [ 629: 630] Allocate a new trap: 0xc000851da0 13 D0713 08:45:18.567821 345766 usertrap_amd64.go:225] [ 629: 630] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:18.567880 345766 task_signals.go:470] [ 629: 629] Notified of signal 23 D0713 08:45:18.567970 345766 task_signals.go:220] [ 629: 629] Signal 23: delivering to handler I0713 08:45:18.573450 345766 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 08:45:18.573724 345766 usertrap_amd64.go:212] [ 629: 629] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.573746 345766 usertrap_amd64.go:122] [ 629: 629] Allocate a new trap: 0xc000851da0 14 D0713 08:45:18.573770 345766 usertrap_amd64.go:225] [ 629: 629] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:18.573996 345766 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.574056 345766 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.574054 345766 task_signals.go:204] [ 629: 631] Signal 629, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.574085 345766 task_exit.go:204] [ 629: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.574130 345766 task_signals.go:204] [ 629: 632] Signal 629, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.574168 345766 task_exit.go:204] [ 629: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.574181 345766 task_exit.go:204] [ 629: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.574210 345766 task_signals.go:204] [ 629: 634] Signal 629, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.574209 345766 task_signals.go:204] [ 629: 630] Signal 629, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.574232 345766 task_exit.go:204] [ 629: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.574299 345766 task_signals.go:204] [ 629: 633] Signal 629, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.574339 345766 task_exit.go:204] [ 629: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.574347 345766 task_exit.go:204] [ 629: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.574367 345766 task_exit.go:204] [ 629: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.574378 345766 task_exit.go:204] [ 629: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.574385 345766 task_exit.go:204] [ 629: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.574398 345766 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.574409 345766 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.574415 345766 task_exit.go:204] [ 629: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.574425 345766 task_exit.go:204] [ 629: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.575513 345766 task_exit.go:204] [ 629: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.575578 345766 task_exit.go:204] [ 629: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.575596 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.575638 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.575675 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.575757 345766 task_exit.go:204] [ 629: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.576295 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.577651 345766 syscalls.go:262] [ 635: 635] Allocating stack with size of 8388608 bytes D0713 08:45:18.577744 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.579074 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.579100 345766 usertrap_amd64.go:106] [ 635: 635] Map a usertrap vma at 66000 D0713 08:45:18.579213 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 1 D0713 08:45:18.579239 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:18.579722 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.579749 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 2 D0713 08:45:18.579761 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:18.580453 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.580481 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 3 D0713 08:45:18.580491 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:18.586863 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.586896 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 4 D0713 08:45:18.586908 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:18.588022 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.588044 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 5 D0713 08:45:18.588053 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:18.588089 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.588095 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 6 D0713 08:45:18.588100 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:18.588676 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.588703 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 7 D0713 08:45:18.588714 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:18.588973 345766 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.589001 345766 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0013ae330 8 D0713 08:45:18.589013 345766 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:18.589227 345766 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.589248 345766 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0013ae330 9 D0713 08:45:18.589341 345766 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:18.589395 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.589410 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 10 D0713 08:45:18.589426 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:18.596097 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.596121 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 11 D0713 08:45:18.596129 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:18.600025 345766 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.600056 345766 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0013ae330 12 D0713 08:45:18.600069 345766 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:18.600130 345766 usertrap_amd64.go:212] [ 635: 636] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.600149 345766 usertrap_amd64.go:122] [ 635: 636] Allocate a new trap: 0xc0013ae330 13 D0713 08:45:18.600159 345766 usertrap_amd64.go:225] [ 635: 636] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:18.600207 345766 task_signals.go:470] [ 635: 635] Notified of signal 23 D0713 08:45:18.600252 345766 task_signals.go:220] [ 635: 635] Signal 23: delivering to handler D0713 08:45:18.605888 345766 usertrap_amd64.go:212] [ 635: 635] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.605917 345766 usertrap_amd64.go:122] [ 635: 635] Allocate a new trap: 0xc0013ae330 14 D0713 08:45:18.605928 345766 usertrap_amd64.go:225] [ 635: 635] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:18.605992 345766 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.606013 345766 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.606033 345766 task_signals.go:204] [ 635: 638] Signal 635, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.606030 345766 task_signals.go:204] [ 635: 637] Signal 635, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.606046 345766 task_exit.go:204] [ 635: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.606053 345766 task_exit.go:204] [ 635: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.606058 345766 task_exit.go:204] [ 635: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.606073 345766 task_signals.go:204] [ 635: 639] Signal 635, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.606074 345766 task_signals.go:204] [ 635: 640] Signal 635, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.606074 345766 task_signals.go:204] [ 635: 636] Signal 635, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.606094 345766 task_exit.go:204] [ 635: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.606117 345766 task_exit.go:204] [ 635: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.606123 345766 task_exit.go:204] [ 635: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.606143 345766 task_exit.go:204] [ 635: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.606150 345766 task_exit.go:204] [ 635: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.606157 345766 task_exit.go:204] [ 635: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.606165 345766 task_exit.go:204] [ 635: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.606180 345766 task_exit.go:204] [ 635: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.606184 345766 task_exit.go:204] [ 635: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.606197 345766 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.607353 345766 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.607389 345766 task_exit.go:204] [ 635: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.607401 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.607424 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.607439 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.607533 345766 task_exit.go:204] [ 635: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.607946 345766 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.609473 345766 syscalls.go:262] [ 641: 641] Allocating stack with size of 8388608 bytes D0713 08:45:18.609561 345766 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.610751 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.610790 345766 usertrap_amd64.go:106] [ 641: 641] Map a usertrap vma at 67000 D0713 08:45:18.610885 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 1 D0713 08:45:18.610938 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:18.611276 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.611295 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 2 D0713 08:45:18.611303 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:18.611784 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.611812 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 3 D0713 08:45:18.611821 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:18.618749 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.618774 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 4 D0713 08:45:18.618784 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:18.619773 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.619789 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 5 D0713 08:45:18.619796 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:18.619809 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.619813 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 6 D0713 08:45:18.619818 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:18.620133 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.620145 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 7 D0713 08:45:18.620150 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:18.620286 345766 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.620310 345766 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc00077cb70 8 D0713 08:45:18.620323 345766 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:18.620640 345766 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.620664 345766 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc00077cb70 9 D0713 08:45:18.620673 345766 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:18.620694 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.620698 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 10 D0713 08:45:18.620703 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:18.628180 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.628201 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 11 D0713 08:45:18.628209 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:18.631627 345766 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.631648 345766 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc00077cb70 12 D0713 08:45:18.631656 345766 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:18.631681 345766 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.631686 345766 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc00077cb70 13 D0713 08:45:18.631693 345766 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:18.631741 345766 task_signals.go:470] [ 641: 641] Notified of signal 23 D0713 08:45:18.631802 345766 task_signals.go:179] [ 641: 641] Restarting syscall 202: interrupted by signal 23 D0713 08:45:18.631824 345766 task_signals.go:220] [ 641: 641] Signal 23: delivering to handler I0713 08:45:18.636634 345766 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 08:45:18.636698 345766 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.636706 345766 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc00077cb70 14 D0713 08:45:18.636719 345766 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b6e0 trap addr 67460 ([184 24 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:18.636738 345766 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.636749 345766 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc00077cb70 15 D0713 08:45:18.636754 345766 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 08:45:18.636773 345766 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.636795 345766 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.636816 345766 task_signals.go:204] [ 641: 645] Signal 641, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.636828 345766 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.636834 345766 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.636838 345766 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.636831 345766 task_signals.go:204] [ 641: 642] Signal 641, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.636813 345766 task_signals.go:204] [ 641: 644] Signal 641, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.636861 345766 task_signals.go:204] [ 641: 643] Signal 641, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.636861 345766 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.636899 345766 task_signals.go:204] [ 641: 646] Signal 641, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.636919 345766 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.636973 345766 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.636988 345766 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.637018 345766 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.637055 345766 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.637061 345766 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.637073 345766 task_exit.go:204] [ 641: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.637138 345766 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.637156 345766 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.638146 345766 task_exit.go:204] [ 641: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.638166 345766 task_exit.go:204] [ 641: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.638176 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.638225 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.638238 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.638336 345766 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.638755 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.640189 345766 syscalls.go:262] [ 647: 647] Allocating stack with size of 8388608 bytes D0713 08:45:18.640352 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.641723 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.641758 345766 usertrap_amd64.go:106] [ 647: 647] Map a usertrap vma at 67000 D0713 08:45:18.641829 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 1 D0713 08:45:18.641852 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:18.642065 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.642079 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 2 D0713 08:45:18.642085 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:18.642493 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.642508 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 3 D0713 08:45:18.642513 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:18.647218 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.647244 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 4 D0713 08:45:18.647252 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:18.648187 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.648203 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 5 D0713 08:45:18.648209 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:18.648225 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.648240 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 6 D0713 08:45:18.648249 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:18.648832 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.648849 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 7 D0713 08:45:18.648855 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:18.648987 345766 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.649003 345766 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc000418e40 8 D0713 08:45:18.649010 345766 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:18.649259 345766 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.649280 345766 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc000418e40 9 D0713 08:45:18.649289 345766 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:18.649319 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.649328 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 10 D0713 08:45:18.649333 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:18.656408 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.656439 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 11 D0713 08:45:18.656454 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:18.659471 345766 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.659509 345766 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc000418e40 12 D0713 08:45:18.659523 345766 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:18.659583 345766 usertrap_amd64.go:212] [ 647: 648] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.659591 345766 usertrap_amd64.go:122] [ 647: 648] Allocate a new trap: 0xc000418e40 13 D0713 08:45:18.659599 345766 usertrap_amd64.go:225] [ 647: 648] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:18.659633 345766 task_signals.go:470] [ 647: 647] Notified of signal 23 D0713 08:45:18.659708 345766 task_signals.go:220] [ 647: 647] Signal 23: delivering to handler I0713 08:45:18.666096 345766 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 08:45:18.666161 345766 usertrap_amd64.go:212] [ 647: 647] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.666174 345766 usertrap_amd64.go:122] [ 647: 647] Allocate a new trap: 0xc000418e40 14 D0713 08:45:18.666186 345766 usertrap_amd64.go:225] [ 647: 647] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:18.666237 345766 task_exit.go:204] [ 647: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.666249 345766 task_exit.go:204] [ 647: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.666251 345766 task_signals.go:204] [ 647: 648] Signal 647, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.666274 345766 task_exit.go:204] [ 647: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.666263 345766 task_signals.go:204] [ 647: 649] Signal 647, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.666293 345766 task_signals.go:204] [ 647: 650] Signal 647, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.666315 345766 task_signals.go:204] [ 647: 651] Signal 647, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.666333 345766 task_exit.go:204] [ 647: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.666340 345766 task_exit.go:204] [ 647: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.666353 345766 task_exit.go:204] [ 647: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.666371 345766 task_exit.go:204] [ 647: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.666383 345766 task_exit.go:204] [ 647: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.666392 345766 task_exit.go:204] [ 647: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.666398 345766 task_exit.go:204] [ 647: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.666402 345766 task_exit.go:204] [ 647: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.666409 345766 task_exit.go:204] [ 647: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.667235 345766 task_exit.go:204] [ 647: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.667254 345766 task_exit.go:204] [ 647: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.667262 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.667289 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.667296 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.667344 345766 task_exit.go:204] [ 647: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.667850 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.669175 345766 syscalls.go:262] [ 652: 652] Allocating stack with size of 8388608 bytes D0713 08:45:18.669254 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.670491 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.670524 345766 usertrap_amd64.go:106] [ 652: 652] Map a usertrap vma at 63000 D0713 08:45:18.670572 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 1 D0713 08:45:18.670595 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:18.670803 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.670824 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 2 D0713 08:45:18.670830 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:18.671286 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.671309 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 3 D0713 08:45:18.671319 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:18.675799 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.675826 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 4 D0713 08:45:18.675837 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:18.676757 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.676783 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 5 D0713 08:45:18.676793 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:18.676833 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.676847 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 6 D0713 08:45:18.676852 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:18.677203 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.677221 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 7 D0713 08:45:18.677229 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:18.677340 345766 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.677366 345766 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc0014739e0 8 D0713 08:45:18.677377 345766 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:18.677659 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.677689 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 9 D0713 08:45:18.677699 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:18.677710 345766 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.677720 345766 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc0014739e0 10 D0713 08:45:18.677729 345766 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b6e0 trap addr 63320 ([184 24 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:18.677783 345766 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.677808 345766 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc0014739e0 11 D0713 08:45:18.677817 345766 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46af76 trap addr 63370 ([184 35 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:18.678085 345766 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.678107 345766 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc0014739e0 12 D0713 08:45:18.678116 345766 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:18.678145 345766 usertrap_amd64.go:212] [ 652: 653] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.678153 345766 usertrap_amd64.go:122] [ 652: 653] Allocate a new trap: 0xc0014739e0 13 D0713 08:45:18.678162 345766 usertrap_amd64.go:225] [ 652: 653] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:18.678186 345766 task_signals.go:470] [ 652: 652] Notified of signal 23 D0713 08:45:18.678261 345766 task_signals.go:220] [ 652: 652] Signal 23: delivering to handler D0713 08:45:18.683797 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.683822 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 14 D0713 08:45:18.683830 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:18.689160 345766 task_signals.go:470] [ 652: 652] Notified of signal 23 D0713 08:45:18.689208 345766 task_signals.go:220] [ 652: 652] Signal 23: delivering to handler I0713 08:45:18.692311 345766 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 08:45:18.692388 345766 usertrap_amd64.go:212] [ 652: 652] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.692396 345766 usertrap_amd64.go:122] [ 652: 652] Allocate a new trap: 0xc0014739e0 15 D0713 08:45:18.692404 345766 usertrap_amd64.go:225] [ 652: 652] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 08:45:18.692428 345766 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.692468 345766 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.692469 345766 task_signals.go:204] [ 652: 653] Signal 652, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.692485 345766 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.692498 345766 task_signals.go:204] [ 652: 655] Signal 652, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.692513 345766 task_signals.go:204] [ 652: 654] Signal 652, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.692553 345766 task_signals.go:204] [ 652: 656] Signal 652, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.692563 345766 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.692570 345766 task_exit.go:204] [ 652: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.692580 345766 task_exit.go:204] [ 652: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.692588 345766 task_exit.go:204] [ 652: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.692592 345766 task_exit.go:204] [ 652: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.692599 345766 task_exit.go:204] [ 652: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.692615 345766 task_exit.go:204] [ 652: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.692620 345766 task_exit.go:204] [ 652: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.692628 345766 task_exit.go:204] [ 652: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.693461 345766 task_exit.go:204] [ 652: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.693484 345766 task_exit.go:204] [ 652: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.693499 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.693525 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.693536 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.693641 345766 task_exit.go:204] [ 652: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.694021 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.695157 345766 syscalls.go:262] [ 657: 657] Allocating stack with size of 8388608 bytes D0713 08:45:18.695278 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.696037 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.696070 345766 usertrap_amd64.go:106] [ 657: 657] Map a usertrap vma at 61000 D0713 08:45:18.696133 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 1 D0713 08:45:18.696153 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:18.696343 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.696359 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 2 D0713 08:45:18.696365 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:18.696692 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.696722 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 3 D0713 08:45:18.696733 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:18.702019 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.702046 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 4 D0713 08:45:18.702055 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:18.702998 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.703018 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 5 D0713 08:45:18.703026 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:18.703071 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.703082 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 6 D0713 08:45:18.703088 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:18.703270 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.703296 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 7 D0713 08:45:18.703304 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:18.703393 345766 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.703416 345766 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc0004b0f00 8 D0713 08:45:18.703424 345766 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:18.703606 345766 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.703632 345766 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc0004b0f00 9 D0713 08:45:18.703642 345766 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:18.703672 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.703692 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 10 D0713 08:45:18.703703 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:18.709515 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.709543 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 11 D0713 08:45:18.709550 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:18.712778 345766 usertrap_amd64.go:212] [ 657: 661] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.712804 345766 usertrap_amd64.go:122] [ 657: 661] Allocate a new trap: 0xc0004b0f00 12 D0713 08:45:18.712814 345766 usertrap_amd64.go:225] [ 657: 661] Apply the binary patch addr 46b6e0 trap addr 613c0 ([184 24 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:18.714277 345766 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.714301 345766 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc0004b0f00 13 D0713 08:45:18.714311 345766 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:18.714367 345766 usertrap_amd64.go:212] [ 657: 658] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.714393 345766 usertrap_amd64.go:122] [ 657: 658] Allocate a new trap: 0xc0004b0f00 14 D0713 08:45:18.714400 345766 usertrap_amd64.go:225] [ 657: 658] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:18.714441 345766 task_signals.go:470] [ 657: 657] Notified of signal 23 D0713 08:45:18.714490 345766 task_signals.go:220] [ 657: 657] Signal 23: delivering to handler D0713 08:45:18.717441 345766 usertrap_amd64.go:212] [ 657: 657] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.717466 345766 usertrap_amd64.go:122] [ 657: 657] Allocate a new trap: 0xc0004b0f00 15 D0713 08:45:18.717476 345766 usertrap_amd64.go:225] [ 657: 657] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 08:45:18.717522 345766 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.717540 345766 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.717556 345766 task_signals.go:204] [ 657: 660] Signal 657, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.717555 345766 task_signals.go:204] [ 657: 659] Signal 657, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.717564 345766 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.717576 345766 task_signals.go:204] [ 657: 658] Signal 657, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.717578 345766 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.717592 345766 task_exit.go:204] [ 657: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.717604 345766 task_signals.go:204] [ 657: 661] Signal 657, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.717610 345766 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.717614 345766 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.717618 345766 task_exit.go:204] [ 657: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.717623 345766 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.717627 345766 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.717636 345766 task_exit.go:204] [ 657: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.717643 345766 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.718380 345766 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.718406 345766 task_exit.go:204] [ 657: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.718416 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.718473 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.718490 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.718599 345766 task_exit.go:204] [ 657: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.719560 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.720799 345766 syscalls.go:262] [ 662: 662] Allocating stack with size of 8388608 bytes D0713 08:45:18.720906 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.722019 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.722056 345766 usertrap_amd64.go:106] [ 662: 662] Map a usertrap vma at 67000 D0713 08:45:18.722122 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 1 D0713 08:45:18.722137 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:18.722354 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.722371 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 2 D0713 08:45:18.722378 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:18.722854 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.722867 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 3 D0713 08:45:18.722879 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:18.727633 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.727661 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 4 D0713 08:45:18.727672 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:18.728641 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.728667 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 5 D0713 08:45:18.728675 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:18.728739 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.728765 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 6 D0713 08:45:18.728780 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:18.729208 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.729230 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 7 D0713 08:45:18.729237 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:18.729367 345766 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.729392 345766 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc00077d6e0 8 D0713 08:45:18.729401 345766 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:18.729545 345766 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.729564 345766 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc00077d6e0 9 D0713 08:45:18.729571 345766 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:18.729680 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.729701 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 10 D0713 08:45:18.729711 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:18.735885 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.735915 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 11 D0713 08:45:18.735927 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:18.739959 345766 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.740006 345766 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc00077d6e0 12 D0713 08:45:18.740021 345766 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:18.740096 345766 usertrap_amd64.go:212] [ 662: 663] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.740132 345766 usertrap_amd64.go:122] [ 662: 663] Allocate a new trap: 0xc00077d6e0 13 D0713 08:45:18.740147 345766 usertrap_amd64.go:225] [ 662: 663] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:18.740221 345766 task_signals.go:470] [ 662: 662] Notified of signal 23 D0713 08:45:18.740314 345766 task_signals.go:220] [ 662: 662] Signal 23: delivering to handler D0713 08:45:18.747194 345766 usertrap_amd64.go:212] [ 662: 662] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.747221 345766 usertrap_amd64.go:122] [ 662: 662] Allocate a new trap: 0xc00077d6e0 14 D0713 08:45:18.747230 345766 usertrap_amd64.go:225] [ 662: 662] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:18.747308 345766 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.747329 345766 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.747352 345766 task_signals.go:204] [ 662: 665] Signal 662, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.747384 345766 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.747378 345766 task_signals.go:204] [ 662: 663] Signal 662, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.747389 345766 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.747417 345766 task_exit.go:204] [ 662: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.747348 345766 task_signals.go:204] [ 662: 664] Signal 662, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.747463 345766 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.747487 345766 task_signals.go:204] [ 662: 666] Signal 662, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.747498 345766 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.747526 345766 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.747544 345766 task_exit.go:204] [ 662: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.747556 345766 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.747620 345766 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.747650 345766 task_exit.go:204] [ 662: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.748585 345766 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.748608 345766 task_exit.go:204] [ 662: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.748618 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.748650 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.748662 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.748854 345766 task_exit.go:204] [ 662: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.749570 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.751102 345766 syscalls.go:262] [ 667: 667] Allocating stack with size of 8388608 bytes D0713 08:45:18.751299 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.752572 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.752616 345766 usertrap_amd64.go:106] [ 667: 667] Map a usertrap vma at 68000 D0713 08:45:18.752690 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 1 D0713 08:45:18.752706 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:18.753116 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.753142 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 2 D0713 08:45:18.753149 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:18.753784 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.753822 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 3 D0713 08:45:18.753838 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:18.760646 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.760686 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 4 D0713 08:45:18.760706 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:18.761811 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.761833 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 5 D0713 08:45:18.761843 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:18.761900 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.761915 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 6 D0713 08:45:18.761921 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:18.762285 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.762301 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 7 D0713 08:45:18.762308 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:18.762460 345766 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.762493 345766 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc0013aefc0 8 D0713 08:45:18.762505 345766 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:18.762731 345766 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.762753 345766 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc0013aefc0 9 D0713 08:45:18.762761 345766 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:18.762863 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.762897 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 10 D0713 08:45:18.762911 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:18.763427 345766 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.763460 345766 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc0013aefc0 11 D0713 08:45:18.763472 345766 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:18.763510 345766 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.763525 345766 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc0013aefc0 12 D0713 08:45:18.763531 345766 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:18.763549 345766 task_signals.go:470] [ 667: 667] Notified of signal 23 D0713 08:45:18.763588 345766 task_signals.go:220] [ 667: 667] Signal 23: delivering to handler D0713 08:45:18.770051 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.770081 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 13 D0713 08:45:18.770091 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:18.773926 345766 task_signals.go:470] [ 667: 667] Notified of signal 23 D0713 08:45:18.773989 345766 task_signals.go:220] [ 667: 667] Signal 23: delivering to handler D0713 08:45:18.780393 345766 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.780440 345766 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0013aefc0 14 D0713 08:45:18.780451 345766 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:18.780575 345766 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.780603 345766 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.780634 345766 task_signals.go:204] [ 667: 668] Signal 667, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.780658 345766 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.780672 345766 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.780679 345766 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.780672 345766 task_signals.go:204] [ 667: 670] Signal 667, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.780759 345766 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.780802 345766 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.780823 345766 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.780706 345766 task_signals.go:204] [ 667: 671] Signal 667, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.780887 345766 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.780925 345766 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.780965 345766 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.780712 345766 task_signals.go:204] [ 667: 669] Signal 667, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.781032 345766 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.783246 345766 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.783331 345766 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.783364 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.783474 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.783520 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.783671 345766 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.784432 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.786352 345766 syscalls.go:262] [ 672: 672] Allocating stack with size of 8388608 bytes D0713 08:45:18.786490 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.787497 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.787543 345766 usertrap_amd64.go:106] [ 672: 672] Map a usertrap vma at 61000 D0713 08:45:18.787643 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 1 D0713 08:45:18.787668 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:18.788205 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.788235 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 2 D0713 08:45:18.788260 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:18.788967 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.788998 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 3 D0713 08:45:18.789011 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:18.795328 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.795365 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 4 D0713 08:45:18.795379 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:18.796358 345766 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0713 08:45:18.796395 345766 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0713 08:45:18.796432 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.796441 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 5 D0713 08:45:18.796464 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:18.796536 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.796543 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 6 D0713 08:45:18.796550 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:18.797014 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.797036 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 7 D0713 08:45:18.797043 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:18.797225 345766 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.797252 345766 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc000a7c390 8 D0713 08:45:18.797263 345766 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:18.797472 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.797490 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 9 D0713 08:45:18.797530 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:18.797554 345766 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.797567 345766 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc000a7c390 10 D0713 08:45:18.797578 345766 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:18.805583 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.805611 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 11 D0713 08:45:18.805620 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:18.808199 345766 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.808236 345766 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc000a7c390 12 D0713 08:45:18.808251 345766 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:18.808273 345766 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.808278 345766 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc000a7c390 13 D0713 08:45:18.808289 345766 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:18.808316 345766 task_signals.go:470] [ 672: 672] Notified of signal 23 D0713 08:45:18.808378 345766 task_signals.go:220] [ 672: 672] Signal 23: delivering to handler D0713 08:45:18.816621 345766 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.816651 345766 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc000a7c390 14 D0713 08:45:18.816663 345766 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:18.816729 345766 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.816758 345766 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.816785 345766 task_signals.go:204] [ 672: 673] Signal 672, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.816809 345766 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.816816 345766 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.816821 345766 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.816788 345766 task_signals.go:204] [ 672: 675] Signal 672, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.816839 345766 task_signals.go:204] [ 672: 676] Signal 672, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.816850 345766 task_signals.go:204] [ 672: 674] Signal 672, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.816867 345766 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.816881 345766 task_signals.go:204] [ 672: 677] Signal 672, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.816904 345766 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.816910 345766 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.816921 345766 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.816929 345766 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.816933 345766 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.816956 345766 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.816976 345766 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.816992 345766 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.817012 345766 task_exit.go:204] [ 672: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.819062 345766 task_exit.go:204] [ 672: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.819106 345766 task_exit.go:204] [ 672: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.819131 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.819194 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.819213 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.819371 345766 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 08:45:18.819424 345766 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.819468 345766 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 08:45:18.820115 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.821848 345766 syscalls.go:262] [ 678: 678] Allocating stack with size of 8388608 bytes D0713 08:45:18.821960 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.823943 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.823982 345766 usertrap_amd64.go:106] [ 678: 678] Map a usertrap vma at 65000 D0713 08:45:18.824085 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 1 D0713 08:45:18.824114 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:18.824346 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.824365 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 2 D0713 08:45:18.824373 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:18.825277 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.825300 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 3 D0713 08:45:18.825309 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:18.831717 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.831826 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 4 D0713 08:45:18.831856 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:18.833646 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.833679 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 5 D0713 08:45:18.833691 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:18.833750 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.833766 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 6 D0713 08:45:18.833774 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:18.834206 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.834226 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 7 D0713 08:45:18.834235 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:18.834484 345766 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.834510 345766 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc000a2e210 8 D0713 08:45:18.834523 345766 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:18.834892 345766 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.834923 345766 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc000a2e210 9 D0713 08:45:18.834935 345766 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:18.835032 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.835057 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 10 D0713 08:45:18.835069 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:18.842469 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.842505 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 11 D0713 08:45:18.842515 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:18.845221 345766 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.845248 345766 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc000a2e210 12 D0713 08:45:18.845261 345766 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:18.845286 345766 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.845295 345766 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc000a2e210 13 D0713 08:45:18.845302 345766 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:18.845353 345766 task_signals.go:470] [ 678: 678] Notified of signal 23 D0713 08:45:18.845427 345766 task_signals.go:220] [ 678: 678] Signal 23: delivering to handler D0713 08:45:18.852319 345766 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.852361 345766 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc000a2e210 14 D0713 08:45:18.852382 345766 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:18.852453 345766 task_exit.go:204] [ 678: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.852482 345766 task_exit.go:204] [ 678: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.852496 345766 task_signals.go:204] [ 678: 680] Signal 678, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.852509 345766 task_signals.go:204] [ 678: 681] Signal 678, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.852528 345766 task_exit.go:204] [ 678: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.852575 345766 task_exit.go:204] [ 678: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.852581 345766 task_exit.go:204] [ 678: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.852529 345766 task_signals.go:204] [ 678: 679] Signal 678, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.852599 345766 task_signals.go:204] [ 678: 682] Signal 678, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.852609 345766 task_exit.go:204] [ 678: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.852614 345766 task_exit.go:204] [ 678: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.852626 345766 task_exit.go:204] [ 678: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.852633 345766 task_exit.go:204] [ 678: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.852654 345766 task_exit.go:204] [ 678: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.852722 345766 task_exit.go:204] [ 678: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.852736 345766 task_exit.go:204] [ 678: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.854102 345766 task_exit.go:204] [ 678: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.854117 345766 task_exit.go:204] [ 678: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.854140 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.854226 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.854254 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.854347 345766 task_exit.go:204] [ 678: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.854463 345766 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 08:45:18.854572 345766 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 08:45:18.855119 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.857438 345766 syscalls.go:262] [ 683: 683] Allocating stack with size of 8388608 bytes D0713 08:45:18.857593 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.858786 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.858838 345766 usertrap_amd64.go:106] [ 683: 683] Map a usertrap vma at 6a000 D0713 08:45:18.858934 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 1 D0713 08:45:18.858968 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:18.859474 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.859500 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 2 D0713 08:45:18.859512 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:18.860183 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.860211 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 3 D0713 08:45:18.860224 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:18.866697 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.866730 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 4 D0713 08:45:18.866742 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:18.868082 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.868102 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 5 D0713 08:45:18.868110 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:18.868179 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.868210 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 6 D0713 08:45:18.868215 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:18.868692 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.868700 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 7 D0713 08:45:18.868714 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:18.868868 345766 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.868908 345766 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc0004195f0 8 D0713 08:45:18.868923 345766 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:18.869178 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.869212 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 9 D0713 08:45:18.869227 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:18.869245 345766 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.869274 345766 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc0004195f0 10 D0713 08:45:18.869287 345766 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:18.878156 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.878206 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 11 D0713 08:45:18.878221 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:18.880680 345766 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.880708 345766 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc0004195f0 12 D0713 08:45:18.880720 345766 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:18.880799 345766 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.880842 345766 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc0004195f0 13 D0713 08:45:18.880854 345766 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:18.880964 345766 task_signals.go:470] [ 683: 683] Notified of signal 23 D0713 08:45:18.881059 345766 task_signals.go:220] [ 683: 683] Signal 23: delivering to handler D0713 08:45:18.889122 345766 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.889150 345766 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc0004195f0 14 D0713 08:45:18.889162 345766 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:18.889223 345766 task_exit.go:204] [ 683: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.889247 345766 task_exit.go:204] [ 683: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.889271 345766 task_signals.go:204] [ 683: 686] Signal 683, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.889269 345766 task_signals.go:204] [ 683: 685] Signal 683, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.889292 345766 task_signals.go:204] [ 683: 684] Signal 683, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.889295 345766 task_exit.go:204] [ 683: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.889337 345766 task_exit.go:204] [ 683: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.889366 345766 task_exit.go:204] [ 683: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.889300 345766 task_signals.go:204] [ 683: 687] Signal 683, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.889384 345766 task_exit.go:204] [ 683: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.889399 345766 task_exit.go:204] [ 683: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.889403 345766 task_exit.go:204] [ 683: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.889433 345766 task_exit.go:204] [ 683: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.889465 345766 task_exit.go:204] [ 683: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.889474 345766 task_exit.go:204] [ 683: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.889485 345766 task_exit.go:204] [ 683: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.891065 345766 task_exit.go:204] [ 683: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.891097 345766 task_exit.go:204] [ 683: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.891113 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.891162 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.891177 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.891221 345766 task_exit.go:204] [ 683: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.891892 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.893793 345766 syscalls.go:262] [ 688: 688] Allocating stack with size of 8388608 bytes D0713 08:45:18.893944 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.895577 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.895620 345766 usertrap_amd64.go:106] [ 688: 688] Map a usertrap vma at 62000 D0713 08:45:18.895746 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 1 D0713 08:45:18.895776 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:18.896176 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.896188 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 2 D0713 08:45:18.896197 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:18.896785 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.896802 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 3 D0713 08:45:18.896813 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:18.904850 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.904881 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 4 D0713 08:45:18.904894 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:18.906123 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.906153 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 5 D0713 08:45:18.906163 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:18.906221 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.906240 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 6 D0713 08:45:18.906249 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:18.906811 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.906834 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 7 D0713 08:45:18.906868 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:18.907062 345766 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.907103 345766 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc000a2e810 8 D0713 08:45:18.907112 345766 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:18.907338 345766 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.907367 345766 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc000a2e810 9 D0713 08:45:18.907382 345766 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:18.907399 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.907408 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 10 D0713 08:45:18.907419 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:18.915676 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.915704 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 11 D0713 08:45:18.915714 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:18.918248 345766 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.918279 345766 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc000a2e810 12 D0713 08:45:18.918288 345766 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:18.918334 345766 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.918340 345766 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc000a2e810 13 D0713 08:45:18.918346 345766 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:18.918378 345766 task_signals.go:470] [ 688: 688] Notified of signal 23 D0713 08:45:18.918503 345766 task_signals.go:220] [ 688: 688] Signal 23: delivering to handler D0713 08:45:18.926266 345766 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.926352 345766 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000a2e810 14 D0713 08:45:18.926408 345766 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:18.926608 345766 task_exit.go:204] [ 688: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.926707 345766 task_exit.go:204] [ 688: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.926793 345766 task_signals.go:204] [ 688: 690] Signal 688, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.926833 345766 task_exit.go:204] [ 688: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.926885 345766 task_exit.go:204] [ 688: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.926895 345766 task_exit.go:204] [ 688: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.926923 345766 task_signals.go:204] [ 688: 689] Signal 688, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.926948 345766 task_exit.go:204] [ 688: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.926961 345766 task_exit.go:204] [ 688: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.926970 345766 task_exit.go:204] [ 688: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.927001 345766 task_signals.go:204] [ 688: 691] Signal 688, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.927015 345766 task_exit.go:204] [ 688: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.927025 345766 task_exit.go:204] [ 688: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.927031 345766 task_exit.go:204] [ 688: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.927048 345766 task_signals.go:204] [ 688: 692] Signal 688, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.927060 345766 task_exit.go:204] [ 688: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.928791 345766 task_exit.go:204] [ 688: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.928816 345766 task_exit.go:204] [ 688: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.928830 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.928861 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.928872 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.929021 345766 task_exit.go:204] [ 688: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.929461 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.931007 345766 syscalls.go:262] [ 693: 693] Allocating stack with size of 8388608 bytes D0713 08:45:18.931119 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.932576 345766 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.932615 345766 usertrap_amd64.go:106] [ 693: 693] Map a usertrap vma at 68000 D0713 08:45:18.932728 345766 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc000a2ea80 1 D0713 08:45:18.932760 345766 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:18.933332 345766 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.933354 345766 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc000a2ea80 2 D0713 08:45:18.933362 345766 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:18.934104 345766 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.934126 345766 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc000a2ea80 3 D0713 08:45:18.934133 345766 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:18.940552 345766 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.940598 345766 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc000a2ea80 4 D0713 08:45:18.940612 345766 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:18.941979 345766 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.942013 345766 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc000a2ea80 5 D0713 08:45:18.942029 345766 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:18.942095 345766 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.942113 345766 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc000a2ea80 6 D0713 08:45:18.942119 345766 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:18.942494 345766 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.942513 345766 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc000a2ea80 7 D0713 08:45:18.942520 345766 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:18.942665 345766 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.942687 345766 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc000a2ea80 8 D0713 08:45:18.942696 345766 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:18.942838 345766 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.942871 345766 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc000a2ea80 9 D0713 08:45:18.942886 345766 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:18.943059 345766 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.943129 345766 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc000a2ea80 10 D0713 08:45:18.943149 345766 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46b020 trap addr 68320 ([184 39 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:18.943283 345766 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.943340 345766 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc000a2ea80 11 D0713 08:45:18.943353 345766 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46b04f trap addr 68370 ([184 234 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:18.943392 345766 task_signals.go:481] [ 693: 693] No task notified of signal 23 D0713 08:45:18.943417 345766 usertrap_amd64.go:212] [ 693: 695] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.943442 345766 usertrap_amd64.go:122] [ 693: 695] Allocate a new trap: 0xc000a2ea80 12 D0713 08:45:18.943454 345766 usertrap_amd64.go:225] [ 693: 695] Apply the binary patch addr 46b57c trap addr 683c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:18.943541 345766 task_signals.go:220] [ 693: 693] Signal 23: delivering to handler D0713 08:45:18.951521 345766 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.951565 345766 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc000a2ea80 13 D0713 08:45:18.951579 345766 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:18.954279 345766 task_signals.go:470] [ 693: 693] Notified of signal 23 D0713 08:45:18.954362 345766 task_signals.go:179] [ 693: 693] Restarting syscall 202: interrupted by signal 23 D0713 08:45:18.954376 345766 task_signals.go:220] [ 693: 693] Signal 23: delivering to handler I0713 08:45:18.963656 345766 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 08:45:18.963823 345766 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:18.963851 345766 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc000a2ea80 14 D0713 08:45:18.963865 345766 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:18.963943 345766 task_exit.go:204] [ 693: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.963968 345766 task_exit.go:204] [ 693: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.964018 345766 task_signals.go:204] [ 693: 697] Signal 693, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.964042 345766 task_exit.go:204] [ 693: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.964026 345766 task_signals.go:204] [ 693: 694] Signal 693, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.964049 345766 task_signals.go:204] [ 693: 695] Signal 693, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.964035 345766 task_signals.go:204] [ 693: 696] Signal 693, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.964059 345766 task_exit.go:204] [ 693: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.964114 345766 task_signals.go:204] [ 693: 698] Signal 693, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:18.964137 345766 task_exit.go:204] [ 693: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.964156 345766 task_exit.go:204] [ 693: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.964174 345766 task_exit.go:204] [ 693: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.964189 345766 task_exit.go:204] [ 693: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.964193 345766 task_exit.go:204] [ 693: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.964203 345766 task_exit.go:204] [ 693: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.964209 345766 task_exit.go:204] [ 693: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.964219 345766 task_exit.go:204] [ 693: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.964225 345766 task_exit.go:204] [ 693: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.964228 345766 task_exit.go:204] [ 693: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.964237 345766 task_exit.go:204] [ 693: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:18.965623 345766 task_exit.go:204] [ 693: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:18.965656 345766 task_exit.go:204] [ 693: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.965677 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:18.965707 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:18.965715 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:18.965883 345766 task_exit.go:204] [ 693: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:18.966598 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.968540 345766 syscalls.go:262] [ 699: 699] Allocating stack with size of 8388608 bytes D0713 08:45:18.968784 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:18.970303 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:18.970423 345766 usertrap_amd64.go:106] [ 699: 699] Map a usertrap vma at 62000 D0713 08:45:18.970570 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 1 D0713 08:45:18.970644 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:18.971287 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:18.971318 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 2 D0713 08:45:18.971331 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:18.972078 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:18.972106 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 3 D0713 08:45:18.972118 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:18.978941 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:18.979003 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 4 D0713 08:45:18.979018 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:18.980210 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:18.980234 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 5 D0713 08:45:18.980244 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:18.980373 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b214:sysno 13 D0713 08:45:18.980392 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 6 D0713 08:45:18.980399 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:18.981214 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:18.981248 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 7 D0713 08:45:18.981261 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:18.981637 345766 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:18.981672 345766 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000a2ee70 8 D0713 08:45:18.981686 345766 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:18.982123 345766 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46af76:sysno 35 D0713 08:45:18.982168 345766 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000a2ee70 9 D0713 08:45:18.982218 345766 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:18.982258 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:18.982270 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 10 D0713 08:45:18.982288 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:18.982572 345766 usertrap_amd64.go:212] [ 699: 702] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:18.982612 345766 usertrap_amd64.go:122] [ 699: 702] Allocate a new trap: 0xc000a2ee70 11 D0713 08:45:18.982630 345766 usertrap_amd64.go:225] [ 699: 702] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:18.990785 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46af29:sysno 293 D0713 08:45:18.990835 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 12 D0713 08:45:18.990860 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:18.993801 345766 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b020:sysno 39 D0713 08:45:18.993836 345766 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000a2ee70 13 D0713 08:45:18.993878 345766 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:18.993906 345766 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:18.993915 345766 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000a2ee70 14 D0713 08:45:18.993926 345766 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:18.993981 345766 task_signals.go:470] [ 699: 699] Notified of signal 23 D0713 08:45:18.994076 345766 task_signals.go:220] [ 699: 699] Signal 23: delivering to handler D0713 08:45:19.003239 345766 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.003300 345766 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000a2ee70 15 D0713 08:45:19.003318 345766 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:19.003406 345766 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.003431 345766 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.003443 345766 task_signals.go:204] [ 699: 701] Signal 699, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.003477 345766 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.003468 345766 task_signals.go:204] [ 699: 702] Signal 699, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.003466 345766 task_signals.go:204] [ 699: 703] Signal 699, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.003500 345766 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.003514 345766 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.003533 345766 task_signals.go:204] [ 699: 700] Signal 699, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.003551 345766 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.003555 345766 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.003583 345766 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.003595 345766 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.003608 345766 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.003614 345766 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.003626 345766 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.005429 345766 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.005463 345766 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.005478 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.005516 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.005533 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.005628 345766 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.006462 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.007622 345766 syscalls.go:262] [ 704: 704] Allocating stack with size of 8388608 bytes D0713 08:45:19.007790 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.009317 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.009354 345766 usertrap_amd64.go:106] [ 704: 704] Map a usertrap vma at 62000 D0713 08:45:19.009468 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 1 D0713 08:45:19.009496 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:19.009980 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.010029 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 2 D0713 08:45:19.010047 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:19.010859 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.010912 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 3 D0713 08:45:19.010925 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:19.018132 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.018209 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 4 D0713 08:45:19.018232 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:19.019456 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.019497 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 5 D0713 08:45:19.019514 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:19.019590 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.019600 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 6 D0713 08:45:19.019610 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:19.020133 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.020167 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 7 D0713 08:45:19.020181 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:19.020478 345766 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.020503 345766 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc0013af920 8 D0713 08:45:19.020512 345766 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:19.020688 345766 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.020710 345766 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc0013af920 9 D0713 08:45:19.020719 345766 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:19.020771 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.020796 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 10 D0713 08:45:19.020819 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:19.029069 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.029097 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 11 D0713 08:45:19.029109 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:19.031434 345766 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.031457 345766 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc0013af920 12 D0713 08:45:19.031465 345766 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:19.031515 345766 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.031570 345766 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc0013af920 13 D0713 08:45:19.031588 345766 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:19.031654 345766 task_signals.go:470] [ 704: 704] Notified of signal 23 D0713 08:45:19.031728 345766 task_signals.go:220] [ 704: 704] Signal 23: delivering to handler D0713 08:45:19.038562 345766 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.038583 345766 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0013af920 14 D0713 08:45:19.038596 345766 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:19.038765 345766 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.038801 345766 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.038826 345766 task_signals.go:204] [ 704: 705] Signal 704, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.038853 345766 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.038867 345766 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.038876 345766 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.038895 345766 task_signals.go:204] [ 704: 707] Signal 704, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.038923 345766 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.038932 345766 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.038937 345766 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.038955 345766 task_signals.go:204] [ 704: 706] Signal 704, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.038979 345766 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.038988 345766 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.039005 345766 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.038982 345766 task_signals.go:204] [ 704: 708] Signal 704, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.039020 345766 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.040884 345766 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.040921 345766 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.040936 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.041048 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.041089 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.041177 345766 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.041373 345766 task_signals.go:470] [ 6: 19] Notified of signal 23 D0713 08:45:19.041485 345766 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0713 08:45:19.041919 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.043613 345766 syscalls.go:262] [ 709: 709] Allocating stack with size of 8388608 bytes D0713 08:45:19.043790 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.044697 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.044758 345766 usertrap_amd64.go:106] [ 709: 709] Map a usertrap vma at 64000 D0713 08:45:19.044855 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 1 D0713 08:45:19.044873 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:19.045528 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.045559 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 2 D0713 08:45:19.045570 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:19.046166 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.046186 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 3 D0713 08:45:19.046194 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:19.051773 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.051799 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 4 D0713 08:45:19.051808 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:19.052713 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.052734 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 5 D0713 08:45:19.052742 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:19.052796 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.052808 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 6 D0713 08:45:19.052814 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:19.053211 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.053226 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 7 D0713 08:45:19.053231 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:19.053290 345766 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.053305 345766 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc001ed2060 8 D0713 08:45:19.053311 345766 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:19.053566 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.053582 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 9 D0713 08:45:19.053589 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:19.053616 345766 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.053639 345766 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc001ed2060 10 D0713 08:45:19.053653 345766 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:19.060978 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.061018 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 11 D0713 08:45:19.061032 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:19.064370 345766 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.064400 345766 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc001ed2060 12 D0713 08:45:19.064425 345766 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:19.064455 345766 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.064476 345766 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc001ed2060 13 D0713 08:45:19.064485 345766 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:19.064544 345766 task_signals.go:470] [ 709: 709] Notified of signal 23 D0713 08:45:19.064630 345766 task_signals.go:220] [ 709: 709] Signal 23: delivering to handler D0713 08:45:19.070461 345766 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.070494 345766 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc001ed2060 14 D0713 08:45:19.070503 345766 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:19.070569 345766 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.070582 345766 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.070601 345766 task_signals.go:204] [ 709: 710] Signal 709, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.070611 345766 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.070616 345766 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.070620 345766 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.070634 345766 task_signals.go:204] [ 709: 711] Signal 709, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.070664 345766 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.070670 345766 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.070674 345766 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.070673 345766 task_signals.go:204] [ 709: 712] Signal 709, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.070686 345766 task_signals.go:204] [ 709: 713] Signal 709, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.070696 345766 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.070749 345766 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.070764 345766 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.070778 345766 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.072228 345766 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.072256 345766 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.072292 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.072319 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.072330 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.072429 345766 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.072933 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.074491 345766 syscalls.go:262] [ 714: 714] Allocating stack with size of 8388608 bytes D0713 08:45:19.074639 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.076045 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.076076 345766 usertrap_amd64.go:106] [ 714: 714] Map a usertrap vma at 62000 D0713 08:45:19.076169 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 1 D0713 08:45:19.076183 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:19.076675 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.076702 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 2 D0713 08:45:19.076716 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:19.077471 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.077490 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 3 D0713 08:45:19.077501 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:19.084515 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.084545 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 4 D0713 08:45:19.084558 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:19.085724 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.085764 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 5 D0713 08:45:19.085775 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:19.085837 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.085851 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 6 D0713 08:45:19.085857 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:19.086175 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.086188 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 7 D0713 08:45:19.086194 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:19.086391 345766 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.086415 345766 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc0013afcb0 8 D0713 08:45:19.086424 345766 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:19.086649 345766 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.086659 345766 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc0013afcb0 9 D0713 08:45:19.086665 345766 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:19.086683 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.086716 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 10 D0713 08:45:19.086742 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:19.087008 345766 usertrap_amd64.go:212] [ 714: 717] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.087031 345766 usertrap_amd64.go:122] [ 714: 717] Allocate a new trap: 0xc0013afcb0 11 D0713 08:45:19.087087 345766 usertrap_amd64.go:225] [ 714: 717] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:19.094382 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.094407 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 12 D0713 08:45:19.094416 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:19.097264 345766 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.097307 345766 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc0013afcb0 13 D0713 08:45:19.097322 345766 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:19.097421 345766 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.097471 345766 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc0013afcb0 14 D0713 08:45:19.097490 345766 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:19.097564 345766 task_signals.go:470] [ 714: 714] Notified of signal 23 D0713 08:45:19.097676 345766 task_signals.go:220] [ 714: 714] Signal 23: delivering to handler D0713 08:45:19.104854 345766 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.104891 345766 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0013afcb0 15 D0713 08:45:19.104905 345766 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:19.105008 345766 task_exit.go:204] [ 714: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.105039 345766 task_exit.go:204] [ 714: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.105077 345766 task_signals.go:204] [ 714: 715] Signal 714, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.105099 345766 task_exit.go:204] [ 714: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.105107 345766 task_exit.go:204] [ 714: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.105111 345766 task_exit.go:204] [ 714: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.105131 345766 task_signals.go:204] [ 714: 716] Signal 714, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.105158 345766 task_signals.go:204] [ 714: 719] Signal 714, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.105156 345766 task_signals.go:204] [ 714: 718] Signal 714, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.105177 345766 task_exit.go:204] [ 714: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.105207 345766 task_exit.go:204] [ 714: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.105232 345766 task_exit.go:204] [ 714: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.105253 345766 task_exit.go:204] [ 714: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.105262 345766 task_exit.go:204] [ 714: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.105281 345766 task_exit.go:204] [ 714: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.105306 345766 task_exit.go:204] [ 714: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.105340 345766 task_exit.go:204] [ 714: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.105349 345766 task_exit.go:204] [ 714: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.105380 345766 task_signals.go:204] [ 714: 717] Signal 714, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.105393 345766 task_exit.go:204] [ 714: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.106649 345766 task_exit.go:204] [ 714: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.106677 345766 task_exit.go:204] [ 714: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.106687 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.106708 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.106715 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.106910 345766 task_exit.go:204] [ 714: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.107449 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.108590 345766 syscalls.go:262] [ 720: 720] Allocating stack with size of 8388608 bytes D0713 08:45:19.108711 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.110485 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.110524 345766 usertrap_amd64.go:106] [ 720: 720] Map a usertrap vma at 68000 D0713 08:45:19.110685 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 1 D0713 08:45:19.110720 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:19.111247 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.111263 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 2 D0713 08:45:19.111271 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:19.111999 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.112016 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 3 D0713 08:45:19.112024 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:19.118471 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.118496 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 4 D0713 08:45:19.118505 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:19.119424 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.119445 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 5 D0713 08:45:19.119455 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:19.119484 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.119495 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 6 D0713 08:45:19.119501 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:19.119836 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.119871 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 7 D0713 08:45:19.119884 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:19.120025 345766 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.120052 345766 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc000a7ced0 8 D0713 08:45:19.120061 345766 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:19.120238 345766 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.120263 345766 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc000a7ced0 9 D0713 08:45:19.120273 345766 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:19.120353 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.120376 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 10 D0713 08:45:19.120428 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:19.120531 345766 usertrap_amd64.go:212] [ 720: 722] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.120551 345766 usertrap_amd64.go:122] [ 720: 722] Allocate a new trap: 0xc000a7ced0 11 D0713 08:45:19.120560 345766 usertrap_amd64.go:225] [ 720: 722] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:19.129313 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.129353 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 12 D0713 08:45:19.129367 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:19.132380 345766 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.132399 345766 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc000a7ced0 13 D0713 08:45:19.132409 345766 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:19.132494 345766 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.132552 345766 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc000a7ced0 14 D0713 08:45:19.132568 345766 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:19.132626 345766 task_signals.go:470] [ 720: 720] Notified of signal 23 D0713 08:45:19.132703 345766 task_signals.go:220] [ 720: 720] Signal 23: delivering to handler D0713 08:45:19.140188 345766 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.140238 345766 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc000a7ced0 15 D0713 08:45:19.140250 345766 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 08:45:19.140326 345766 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.140352 345766 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.140386 345766 task_signals.go:204] [ 720: 723] Signal 720, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.140379 345766 task_signals.go:204] [ 720: 722] Signal 720, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.140398 345766 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.140427 345766 task_signals.go:204] [ 720: 725] Signal 720, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.140438 345766 task_signals.go:204] [ 720: 721] Signal 720, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.140456 345766 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.140471 345766 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.140496 345766 task_signals.go:204] [ 720: 724] Signal 720, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.140514 345766 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.140563 345766 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.140584 345766 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.140604 345766 task_exit.go:204] [ 720: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.140613 345766 task_exit.go:204] [ 720: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.140618 345766 task_exit.go:204] [ 720: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.140626 345766 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.140645 345766 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.140668 345766 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.140687 345766 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.142367 345766 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.142389 345766 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.142401 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.142435 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.142458 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.142642 345766 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.143501 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.145213 345766 syscalls.go:262] [ 726: 726] Allocating stack with size of 8388608 bytes D0713 08:45:19.145340 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.146502 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.146540 345766 usertrap_amd64.go:106] [ 726: 726] Map a usertrap vma at 66000 D0713 08:45:19.146639 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 1 D0713 08:45:19.146670 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:19.147118 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.147144 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 2 D0713 08:45:19.147155 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:19.147762 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.147779 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 3 D0713 08:45:19.147786 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:19.154137 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.154163 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 4 D0713 08:45:19.154171 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:19.155219 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.155238 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 5 D0713 08:45:19.155245 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:19.155257 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.155261 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 6 D0713 08:45:19.155266 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:19.155411 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.155425 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 7 D0713 08:45:19.155431 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:19.155527 345766 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.155541 345766 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc001ed2750 8 D0713 08:45:19.155546 345766 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:19.155821 345766 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.155849 345766 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc001ed2750 9 D0713 08:45:19.155864 345766 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:19.155884 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.155900 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 10 D0713 08:45:19.155912 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:19.156036 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.156048 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 11 D0713 08:45:19.156058 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:19.163744 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.163770 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 12 D0713 08:45:19.163782 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:19.166590 345766 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.166615 345766 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc001ed2750 13 D0713 08:45:19.166625 345766 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:19.166682 345766 usertrap_amd64.go:212] [ 726: 727] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.166698 345766 usertrap_amd64.go:122] [ 726: 727] Allocate a new trap: 0xc001ed2750 14 D0713 08:45:19.166705 345766 usertrap_amd64.go:225] [ 726: 727] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:19.166722 345766 task_signals.go:470] [ 726: 726] Notified of signal 23 D0713 08:45:19.166796 345766 task_signals.go:220] [ 726: 726] Signal 23: delivering to handler I0713 08:45:19.176082 345766 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 08:45:19.176180 345766 usertrap_amd64.go:212] [ 726: 726] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.176198 345766 usertrap_amd64.go:122] [ 726: 726] Allocate a new trap: 0xc001ed2750 15 D0713 08:45:19.176215 345766 usertrap_amd64.go:225] [ 726: 726] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 08:45:19.176317 345766 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.176402 345766 task_signals.go:204] [ 726: 728] Signal 726, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.176406 345766 task_signals.go:204] [ 726: 727] Signal 726, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.176405 345766 task_signals.go:204] [ 726: 730] Signal 726, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.176431 345766 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.176466 345766 task_signals.go:204] [ 726: 729] Signal 726, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.176494 345766 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.176517 345766 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.176534 345766 task_exit.go:204] [ 726: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.176553 345766 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.176573 345766 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.176579 345766 task_exit.go:204] [ 726: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.176604 345766 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.176630 345766 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.176636 345766 task_exit.go:204] [ 726: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.176665 345766 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.178745 345766 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.178796 345766 task_exit.go:204] [ 726: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.178817 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.178852 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.178885 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.178933 345766 task_exit.go:204] [ 726: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.179578 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.180981 345766 syscalls.go:262] [ 731: 731] Allocating stack with size of 8388608 bytes D0713 08:45:19.181135 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.182907 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.182945 345766 usertrap_amd64.go:106] [ 731: 731] Map a usertrap vma at 62000 D0713 08:45:19.183045 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 1 D0713 08:45:19.183079 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:19.183621 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.183655 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 2 D0713 08:45:19.183671 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:19.184521 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.184547 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 3 D0713 08:45:19.184557 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:19.192057 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.192104 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 4 D0713 08:45:19.192129 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:19.193350 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.193380 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 5 D0713 08:45:19.193390 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:19.193449 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.193461 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 6 D0713 08:45:19.193486 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:19.194003 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.194019 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 7 D0713 08:45:19.194027 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:19.194260 345766 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.194275 345766 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc001bb1110 8 D0713 08:45:19.194282 345766 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:19.194561 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.194592 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 9 D0713 08:45:19.194608 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:19.194620 345766 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.194624 345766 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc001bb1110 10 D0713 08:45:19.194632 345766 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:19.202224 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.202262 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 11 D0713 08:45:19.202270 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:19.206336 345766 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.206377 345766 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc001bb1110 12 D0713 08:45:19.206392 345766 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:19.206456 345766 usertrap_amd64.go:212] [ 731: 732] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.206480 345766 usertrap_amd64.go:122] [ 731: 732] Allocate a new trap: 0xc001bb1110 13 D0713 08:45:19.206487 345766 usertrap_amd64.go:225] [ 731: 732] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:19.206544 345766 task_signals.go:470] [ 731: 731] Notified of signal 23 D0713 08:45:19.206646 345766 task_signals.go:220] [ 731: 731] Signal 23: delivering to handler D0713 08:45:19.216107 345766 usertrap_amd64.go:212] [ 731: 731] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.216143 345766 usertrap_amd64.go:122] [ 731: 731] Allocate a new trap: 0xc001bb1110 14 D0713 08:45:19.216154 345766 usertrap_amd64.go:225] [ 731: 731] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:19.216237 345766 task_exit.go:204] [ 731: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.216267 345766 task_exit.go:204] [ 731: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.216300 345766 task_signals.go:204] [ 731: 734] Signal 731, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.216320 345766 task_exit.go:204] [ 731: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.216330 345766 task_exit.go:204] [ 731: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.216336 345766 task_exit.go:204] [ 731: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.216317 345766 task_signals.go:204] [ 731: 733] Signal 731, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.216353 345766 task_signals.go:204] [ 731: 732] Signal 731, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.216363 345766 task_exit.go:204] [ 731: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.216369 345766 task_exit.go:204] [ 731: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.216412 345766 task_exit.go:204] [ 731: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.216418 345766 task_exit.go:204] [ 731: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.216360 345766 task_signals.go:204] [ 731: 735] Signal 731, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.216438 345766 task_exit.go:204] [ 731: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.216447 345766 task_exit.go:204] [ 731: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.216452 345766 task_exit.go:204] [ 731: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.217941 345766 task_exit.go:204] [ 731: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.217979 345766 task_exit.go:204] [ 731: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.217996 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.218084 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.218144 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.218222 345766 task_exit.go:204] [ 731: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.218972 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.220787 345766 syscalls.go:262] [ 736: 736] Allocating stack with size of 8388608 bytes D0713 08:45:19.221079 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.222071 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.222105 345766 usertrap_amd64.go:106] [ 736: 736] Map a usertrap vma at 63000 D0713 08:45:19.222185 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 1 D0713 08:45:19.222203 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:19.222694 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.222724 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 2 D0713 08:45:19.222737 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:19.223493 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.223518 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 3 D0713 08:45:19.223528 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:19.231149 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.231182 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 4 D0713 08:45:19.231209 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:19.232375 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.232400 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 5 D0713 08:45:19.232411 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:19.232444 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.232456 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 6 D0713 08:45:19.232462 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:19.232838 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.232853 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 7 D0713 08:45:19.232860 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:19.233064 345766 usertrap_amd64.go:212] [ 736: 737] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.233080 345766 usertrap_amd64.go:122] [ 736: 737] Allocate a new trap: 0xc000a2f740 8 D0713 08:45:19.233086 345766 usertrap_amd64.go:225] [ 736: 737] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:19.233270 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.233289 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 9 D0713 08:45:19.233299 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:19.233313 345766 usertrap_amd64.go:212] [ 736: 737] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.233318 345766 usertrap_amd64.go:122] [ 736: 737] Allocate a new trap: 0xc000a2f740 10 D0713 08:45:19.233373 345766 usertrap_amd64.go:225] [ 736: 737] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:19.233838 345766 usertrap_amd64.go:212] [ 736: 737] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.233863 345766 usertrap_amd64.go:122] [ 736: 737] Allocate a new trap: 0xc000a2f740 11 D0713 08:45:19.233876 345766 usertrap_amd64.go:225] [ 736: 737] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:19.233918 345766 usertrap_amd64.go:212] [ 736: 737] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.233930 345766 usertrap_amd64.go:122] [ 736: 737] Allocate a new trap: 0xc000a2f740 12 D0713 08:45:19.233937 345766 usertrap_amd64.go:225] [ 736: 737] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:19.233953 345766 task_signals.go:470] [ 736: 736] Notified of signal 23 D0713 08:45:19.233985 345766 task_signals.go:220] [ 736: 736] Signal 23: delivering to handler D0713 08:45:19.240537 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.240557 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 13 D0713 08:45:19.240568 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:19.244682 345766 task_signals.go:470] [ 736: 736] Notified of signal 23 D0713 08:45:19.244748 345766 task_signals.go:220] [ 736: 736] Signal 23: delivering to handler I0713 08:45:19.251729 345766 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 08:45:19.252036 345766 usertrap_amd64.go:212] [ 736: 736] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.252069 345766 usertrap_amd64.go:122] [ 736: 736] Allocate a new trap: 0xc000a2f740 14 D0713 08:45:19.252116 345766 usertrap_amd64.go:225] [ 736: 736] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:19.252334 345766 task_exit.go:204] [ 736: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.252440 345766 task_exit.go:204] [ 736: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.252433 345766 task_signals.go:204] [ 736: 740] Signal 736, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.252551 345766 task_exit.go:204] [ 736: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.252449 345766 task_signals.go:204] [ 736: 737] Signal 736, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.252547 345766 task_signals.go:204] [ 736: 738] Signal 736, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.252566 345766 task_exit.go:204] [ 736: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.252621 345766 task_exit.go:204] [ 736: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.252674 345766 task_signals.go:204] [ 736: 739] Signal 736, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.252692 345766 task_exit.go:204] [ 736: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.252707 345766 task_exit.go:204] [ 736: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.252713 345766 task_exit.go:204] [ 736: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.252722 345766 task_exit.go:204] [ 736: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.252755 345766 task_exit.go:204] [ 736: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.252763 345766 task_exit.go:204] [ 736: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.252804 345766 task_exit.go:204] [ 736: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.254223 345766 task_exit.go:204] [ 736: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.254276 345766 task_exit.go:204] [ 736: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.254303 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.254341 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.254362 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.254520 345766 task_exit.go:204] [ 736: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.255225 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.257043 345766 syscalls.go:262] [ 741: 741] Allocating stack with size of 8388608 bytes D0713 08:45:19.257406 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.258355 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.258403 345766 usertrap_amd64.go:106] [ 741: 741] Map a usertrap vma at 66000 D0713 08:45:19.258482 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 1 D0713 08:45:19.258544 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:19.258814 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.258836 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 2 D0713 08:45:19.258847 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:19.259325 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.259361 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 3 D0713 08:45:19.259384 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:19.265310 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.265342 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 4 D0713 08:45:19.265355 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:19.266563 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.266592 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 5 D0713 08:45:19.266603 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:19.266660 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.266673 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 6 D0713 08:45:19.266679 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:19.267001 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.267016 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 7 D0713 08:45:19.267022 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:19.267170 345766 usertrap_amd64.go:212] [ 741: 742] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.267186 345766 usertrap_amd64.go:122] [ 741: 742] Allocate a new trap: 0xc000a2fc20 8 D0713 08:45:19.267195 345766 usertrap_amd64.go:225] [ 741: 742] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:19.267339 345766 usertrap_amd64.go:212] [ 741: 742] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.267375 345766 usertrap_amd64.go:122] [ 741: 742] Allocate a new trap: 0xc000a2fc20 9 D0713 08:45:19.267394 345766 usertrap_amd64.go:225] [ 741: 742] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:19.267469 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.267493 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 10 D0713 08:45:19.267503 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:19.273763 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.273787 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 11 D0713 08:45:19.273795 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:19.278689 345766 usertrap_amd64.go:212] [ 741: 742] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.278715 345766 usertrap_amd64.go:122] [ 741: 742] Allocate a new trap: 0xc000a2fc20 12 D0713 08:45:19.278724 345766 usertrap_amd64.go:225] [ 741: 742] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:19.278779 345766 usertrap_amd64.go:212] [ 741: 742] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.278793 345766 usertrap_amd64.go:122] [ 741: 742] Allocate a new trap: 0xc000a2fc20 13 D0713 08:45:19.278798 345766 usertrap_amd64.go:225] [ 741: 742] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:19.278847 345766 task_signals.go:470] [ 741: 741] Notified of signal 23 D0713 08:45:19.278932 345766 task_signals.go:220] [ 741: 741] Signal 23: delivering to handler D0713 08:45:19.281900 345766 usertrap_amd64.go:212] [ 741: 741] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.281936 345766 usertrap_amd64.go:122] [ 741: 741] Allocate a new trap: 0xc000a2fc20 14 D0713 08:45:19.281946 345766 usertrap_amd64.go:225] [ 741: 741] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:19.281997 345766 task_exit.go:204] [ 741: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.282014 345766 task_exit.go:204] [ 741: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.282033 345766 task_signals.go:204] [ 741: 744] Signal 741, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.282057 345766 task_exit.go:204] [ 741: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.282032 345766 task_signals.go:204] [ 741: 743] Signal 741, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.282073 345766 task_exit.go:204] [ 741: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.282054 345766 task_signals.go:204] [ 741: 745] Signal 741, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.282112 345766 task_exit.go:204] [ 741: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.282140 345766 task_signals.go:204] [ 741: 742] Signal 741, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.282149 345766 task_exit.go:204] [ 741: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.282157 345766 task_exit.go:204] [ 741: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.282200 345766 task_exit.go:204] [ 741: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.282206 345766 task_exit.go:204] [ 741: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.282217 345766 task_exit.go:204] [ 741: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.282234 345766 task_exit.go:204] [ 741: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.282245 345766 task_exit.go:204] [ 741: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.283158 345766 task_exit.go:204] [ 741: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.283178 345766 task_exit.go:204] [ 741: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.283187 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.283235 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.283251 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.283345 345766 task_exit.go:204] [ 741: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.283842 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.285077 345766 syscalls.go:262] [ 746: 746] Allocating stack with size of 8388608 bytes D0713 08:45:19.285160 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.286533 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.286599 345766 usertrap_amd64.go:106] [ 746: 746] Map a usertrap vma at 64000 D0713 08:45:19.286679 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 1 D0713 08:45:19.286705 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:19.287038 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.287066 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 2 D0713 08:45:19.287077 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:19.287696 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.287718 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 3 D0713 08:45:19.287727 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:19.292036 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.292063 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 4 D0713 08:45:19.292073 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:19.293264 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.293290 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 5 D0713 08:45:19.293298 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:19.293331 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.293337 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 6 D0713 08:45:19.293343 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:19.293509 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.293524 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 7 D0713 08:45:19.293530 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:19.293628 345766 usertrap_amd64.go:212] [ 746: 747] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.293643 345766 usertrap_amd64.go:122] [ 746: 747] Allocate a new trap: 0xc00041b1d0 8 D0713 08:45:19.293650 345766 usertrap_amd64.go:225] [ 746: 747] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:19.293778 345766 usertrap_amd64.go:212] [ 746: 747] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.293799 345766 usertrap_amd64.go:122] [ 746: 747] Allocate a new trap: 0xc00041b1d0 9 D0713 08:45:19.293808 345766 usertrap_amd64.go:225] [ 746: 747] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:19.293997 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.294023 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 10 D0713 08:45:19.294034 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:19.294247 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.294310 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 11 D0713 08:45:19.294329 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:19.304325 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.304393 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 12 D0713 08:45:19.304421 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:19.304642 345766 usertrap_amd64.go:212] [ 746: 747] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.304681 345766 usertrap_amd64.go:122] [ 746: 747] Allocate a new trap: 0xc00041b1d0 13 D0713 08:45:19.304702 345766 usertrap_amd64.go:225] [ 746: 747] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:19.304748 345766 usertrap_amd64.go:212] [ 746: 747] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.304767 345766 usertrap_amd64.go:122] [ 746: 747] Allocate a new trap: 0xc00041b1d0 14 D0713 08:45:19.304778 345766 usertrap_amd64.go:225] [ 746: 747] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:19.304857 345766 task_signals.go:470] [ 746: 746] Notified of signal 23 D0713 08:45:19.306106 345766 task_signals.go:220] [ 746: 746] Signal 23: delivering to handler I0713 08:45:19.317130 345766 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 08:45:19.317228 345766 usertrap_amd64.go:212] [ 746: 746] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.317251 345766 usertrap_amd64.go:122] [ 746: 746] Allocate a new trap: 0xc00041b1d0 15 D0713 08:45:19.317264 345766 usertrap_amd64.go:225] [ 746: 746] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 08:45:19.317344 345766 task_exit.go:204] [ 746: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.317377 345766 task_exit.go:204] [ 746: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.317407 345766 task_signals.go:204] [ 746: 749] Signal 746, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.317423 345766 task_exit.go:204] [ 746: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.317431 345766 task_exit.go:204] [ 746: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.317438 345766 task_exit.go:204] [ 746: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.317471 345766 task_signals.go:204] [ 746: 748] Signal 746, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.317485 345766 task_exit.go:204] [ 746: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.317491 345766 task_exit.go:204] [ 746: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.317496 345766 task_exit.go:204] [ 746: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.317486 345766 task_signals.go:204] [ 746: 747] Signal 746, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.317534 345766 task_exit.go:204] [ 746: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.317501 345766 task_signals.go:204] [ 746: 750] Signal 746, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.317566 345766 task_exit.go:204] [ 746: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.317637 345766 task_exit.go:204] [ 746: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.317687 345766 task_exit.go:204] [ 746: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.319238 345766 task_exit.go:204] [ 746: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.319283 345766 task_exit.go:204] [ 746: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.319311 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.319362 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.319373 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.319468 345766 task_exit.go:204] [ 746: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.320202 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.321968 345766 syscalls.go:262] [ 751: 751] Allocating stack with size of 8388608 bytes D0713 08:45:19.322124 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.323499 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.323569 345766 usertrap_amd64.go:106] [ 751: 751] Map a usertrap vma at 69000 D0713 08:45:19.323649 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 1 D0713 08:45:19.323679 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:19.323990 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.324007 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 2 D0713 08:45:19.324014 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:19.324498 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.324516 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 3 D0713 08:45:19.324522 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:19.331127 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.331162 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 4 D0713 08:45:19.331177 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:19.332288 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.332316 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 5 D0713 08:45:19.332329 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:19.332432 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.332464 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 6 D0713 08:45:19.332479 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:19.333164 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.333189 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 7 D0713 08:45:19.333198 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:19.333346 345766 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.333367 345766 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc00041a0c0 8 D0713 08:45:19.333377 345766 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:19.333642 345766 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.333681 345766 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc00041a0c0 9 D0713 08:45:19.333695 345766 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:19.333777 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.333790 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 10 D0713 08:45:19.333800 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:19.341327 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.341344 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 11 D0713 08:45:19.341353 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:19.345130 345766 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.345158 345766 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc00041a0c0 12 D0713 08:45:19.345168 345766 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:19.345185 345766 usertrap_amd64.go:212] [ 751: 752] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.345190 345766 usertrap_amd64.go:122] [ 751: 752] Allocate a new trap: 0xc00041a0c0 13 D0713 08:45:19.345195 345766 usertrap_amd64.go:225] [ 751: 752] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:19.345219 345766 task_signals.go:470] [ 751: 751] Notified of signal 23 D0713 08:45:19.345298 345766 task_signals.go:179] [ 751: 751] Restarting syscall 202: interrupted by signal 23 D0713 08:45:19.345328 345766 task_signals.go:220] [ 751: 751] Signal 23: delivering to handler I0713 08:45:19.351350 345766 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 08:45:19.351448 345766 usertrap_amd64.go:212] [ 751: 751] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.351496 345766 usertrap_amd64.go:122] [ 751: 751] Allocate a new trap: 0xc00041a0c0 14 D0713 08:45:19.351510 345766 usertrap_amd64.go:225] [ 751: 751] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:19.351551 345766 task_exit.go:204] [ 751: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.351578 345766 task_exit.go:204] [ 751: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.351591 345766 task_signals.go:204] [ 751: 752] Signal 751, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.351611 345766 task_signals.go:204] [ 751: 754] Signal 751, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.351630 345766 task_exit.go:204] [ 751: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.351656 345766 task_signals.go:204] [ 751: 756] Signal 751, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.351668 345766 task_signals.go:204] [ 751: 753] Signal 751, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.351733 345766 task_signals.go:204] [ 751: 755] Signal 751, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.351742 345766 task_exit.go:204] [ 751: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.351746 345766 task_exit.go:204] [ 751: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.351758 345766 task_exit.go:204] [ 751: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.351769 345766 task_exit.go:204] [ 751: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.351772 345766 task_exit.go:204] [ 751: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.351782 345766 task_exit.go:204] [ 751: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.351787 345766 task_exit.go:204] [ 751: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.351790 345766 task_exit.go:204] [ 751: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.351797 345766 task_exit.go:204] [ 751: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.351802 345766 task_exit.go:204] [ 751: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.351805 345766 task_exit.go:204] [ 751: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.351813 345766 task_exit.go:204] [ 751: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.353072 345766 task_exit.go:204] [ 751: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.353093 345766 task_exit.go:204] [ 751: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.353107 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.353170 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.353192 345766 task_exit.go:204] [ 751: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.353902 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.355525 345766 syscalls.go:262] [ 757: 757] Allocating stack with size of 8388608 bytes D0713 08:45:19.355683 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.356716 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.356782 345766 usertrap_amd64.go:106] [ 757: 757] Map a usertrap vma at 68000 D0713 08:45:19.356871 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 1 D0713 08:45:19.356890 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:19.357296 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.357325 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 2 D0713 08:45:19.357336 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:19.357973 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.357994 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 3 D0713 08:45:19.358002 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:19.363810 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.363842 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 4 D0713 08:45:19.363854 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:19.364891 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.364901 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 5 D0713 08:45:19.364907 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:19.364921 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.364926 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 6 D0713 08:45:19.364930 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:19.365437 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.365463 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 7 D0713 08:45:19.365473 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:19.365751 345766 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.365770 345766 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc001026300 8 D0713 08:45:19.365776 345766 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:19.365899 345766 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.365932 345766 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc001026300 9 D0713 08:45:19.365972 345766 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:19.366025 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.366039 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 10 D0713 08:45:19.366052 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:19.374725 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.374749 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 11 D0713 08:45:19.374757 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:19.377013 345766 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.377050 345766 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc001026300 12 D0713 08:45:19.377061 345766 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:19.377153 345766 usertrap_amd64.go:212] [ 757: 758] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.377183 345766 usertrap_amd64.go:122] [ 757: 758] Allocate a new trap: 0xc001026300 13 D0713 08:45:19.377197 345766 usertrap_amd64.go:225] [ 757: 758] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:19.377239 345766 task_signals.go:470] [ 757: 757] Notified of signal 23 D0713 08:45:19.377361 345766 task_signals.go:220] [ 757: 757] Signal 23: delivering to handler D0713 08:45:19.385070 345766 usertrap_amd64.go:212] [ 757: 757] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.385108 345766 usertrap_amd64.go:122] [ 757: 757] Allocate a new trap: 0xc001026300 14 D0713 08:45:19.385119 345766 usertrap_amd64.go:225] [ 757: 757] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:19.385194 345766 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.385232 345766 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.385253 345766 task_signals.go:204] [ 757: 759] Signal 757, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.385296 345766 task_signals.go:204] [ 757: 761] Signal 757, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.385293 345766 task_signals.go:204] [ 757: 758] Signal 757, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.385298 345766 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.385273 345766 task_signals.go:204] [ 757: 760] Signal 757, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.385354 345766 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.385394 345766 task_exit.go:204] [ 757: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.385436 345766 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.385472 345766 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.385483 345766 task_exit.go:204] [ 757: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.385493 345766 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.385500 345766 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.385503 345766 task_exit.go:204] [ 757: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.385511 345766 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.386767 345766 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.386794 345766 task_exit.go:204] [ 757: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.386806 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.386830 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:19.386853 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.386956 345766 task_exit.go:204] [ 757: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.387563 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.388882 345766 syscalls.go:262] [ 762: 762] Allocating stack with size of 8388608 bytes D0713 08:45:19.389035 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.390696 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.390739 345766 usertrap_amd64.go:106] [ 762: 762] Map a usertrap vma at 66000 D0713 08:45:19.390828 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 1 D0713 08:45:19.390863 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:19.391360 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.391386 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 2 D0713 08:45:19.391396 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:19.392611 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.392676 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 3 D0713 08:45:19.392704 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:19.398020 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.398052 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 4 D0713 08:45:19.398067 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:19.399384 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.399411 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 5 D0713 08:45:19.399421 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:19.399477 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.399482 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 6 D0713 08:45:19.399488 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:19.399677 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.399692 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 7 D0713 08:45:19.399698 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:19.399834 345766 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.399857 345766 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00041a240 8 D0713 08:45:19.399871 345766 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:19.400056 345766 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.400084 345766 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00041a240 9 D0713 08:45:19.400096 345766 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:19.400182 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.400206 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 10 D0713 08:45:19.400214 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:19.408460 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.408491 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 11 D0713 08:45:19.408501 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:19.410956 345766 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.410986 345766 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00041a240 12 D0713 08:45:19.410998 345766 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:19.411059 345766 usertrap_amd64.go:212] [ 762: 763] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.411082 345766 usertrap_amd64.go:122] [ 762: 763] Allocate a new trap: 0xc00041a240 13 D0713 08:45:19.411090 345766 usertrap_amd64.go:225] [ 762: 763] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:19.411125 345766 task_signals.go:470] [ 762: 762] Notified of signal 23 D0713 08:45:19.411192 345766 task_signals.go:220] [ 762: 762] Signal 23: delivering to handler D0713 08:45:19.419930 345766 usertrap_amd64.go:212] [ 762: 762] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.419960 345766 usertrap_amd64.go:122] [ 762: 762] Allocate a new trap: 0xc00041a240 14 D0713 08:45:19.419969 345766 usertrap_amd64.go:225] [ 762: 762] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:19.420038 345766 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.420063 345766 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.420084 345766 task_signals.go:204] [ 762: 765] Signal 762, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.420095 345766 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.420116 345766 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.420120 345766 task_exit.go:204] [ 762: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.420150 345766 task_signals.go:204] [ 762: 764] Signal 762, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.420155 345766 task_signals.go:204] [ 762: 766] Signal 762, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.420164 345766 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.420215 345766 task_signals.go:204] [ 762: 763] Signal 762, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.420237 345766 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.420252 345766 task_exit.go:204] [ 762: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.420268 345766 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.420285 345766 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.420289 345766 task_exit.go:204] [ 762: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.420305 345766 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.421694 345766 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.421737 345766 task_exit.go:204] [ 762: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.421753 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.421797 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:19.421825 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.421919 345766 task_exit.go:204] [ 762: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.422537 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.424090 345766 syscalls.go:262] [ 767: 767] Allocating stack with size of 8388608 bytes D0713 08:45:19.424229 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.425762 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.425814 345766 usertrap_amd64.go:106] [ 767: 767] Map a usertrap vma at 64000 D0713 08:45:19.425926 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 1 D0713 08:45:19.425961 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:19.426385 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.426416 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 2 D0713 08:45:19.426429 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:19.427150 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.427181 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 3 D0713 08:45:19.427195 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:19.432701 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.432737 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 4 D0713 08:45:19.432747 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:19.434099 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.434122 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 5 D0713 08:45:19.434134 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:19.434192 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.434208 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 6 D0713 08:45:19.434214 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:19.434597 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.434615 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 7 D0713 08:45:19.434621 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:19.434801 345766 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.434830 345766 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc001fba330 8 D0713 08:45:19.434842 345766 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:19.435133 345766 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.435192 345766 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc001fba330 9 D0713 08:45:19.435208 345766 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:19.435225 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.435253 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 10 D0713 08:45:19.435267 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:19.435770 345766 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.435788 345766 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc001fba330 11 D0713 08:45:19.435799 345766 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:19.435869 345766 usertrap_amd64.go:212] [ 767: 768] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.435893 345766 usertrap_amd64.go:122] [ 767: 768] Allocate a new trap: 0xc001fba330 12 D0713 08:45:19.435902 345766 usertrap_amd64.go:225] [ 767: 768] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:19.435917 345766 task_signals.go:470] [ 767: 767] Notified of signal 23 D0713 08:45:19.435934 345766 task_signals.go:220] [ 767: 767] Signal 23: delivering to handler D0713 08:45:19.442254 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.442312 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 13 D0713 08:45:19.442328 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:19.446229 345766 task_signals.go:470] [ 767: 767] Notified of signal 23 D0713 08:45:19.446289 345766 task_signals.go:220] [ 767: 767] Signal 23: delivering to handler D0713 08:45:19.452282 345766 usertrap_amd64.go:212] [ 767: 767] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.452315 345766 usertrap_amd64.go:122] [ 767: 767] Allocate a new trap: 0xc001fba330 14 D0713 08:45:19.452325 345766 usertrap_amd64.go:225] [ 767: 767] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:19.452395 345766 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.452410 345766 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.452431 345766 task_signals.go:204] [ 767: 770] Signal 767, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.452447 345766 task_signals.go:204] [ 767: 771] Signal 767, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.452454 345766 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.452461 345766 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.452465 345766 task_exit.go:204] [ 767: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.452459 345766 task_signals.go:204] [ 767: 769] Signal 767, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.452484 345766 task_signals.go:204] [ 767: 768] Signal 767, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.452500 345766 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.452532 345766 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.452542 345766 task_exit.go:204] [ 767: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.452559 345766 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.452569 345766 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.452577 345766 task_exit.go:204] [ 767: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.452589 345766 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.453773 345766 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.453805 345766 task_exit.go:204] [ 767: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.453821 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.453873 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.453908 345766 task_exit.go:204] [ 767: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.454689 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.456343 345766 syscalls.go:262] [ 772: 772] Allocating stack with size of 8388608 bytes D0713 08:45:19.456456 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.458477 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.458521 345766 usertrap_amd64.go:106] [ 772: 772] Map a usertrap vma at 68000 D0713 08:45:19.458650 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 1 D0713 08:45:19.458671 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:19.459186 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.459200 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 2 D0713 08:45:19.459210 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:19.459998 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.460024 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 3 D0713 08:45:19.460035 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:19.465890 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.465917 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 4 D0713 08:45:19.465927 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:19.466842 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.466864 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 5 D0713 08:45:19.466875 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:19.466951 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.466966 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 6 D0713 08:45:19.466974 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:19.467186 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.467201 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 7 D0713 08:45:19.467210 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:19.467375 345766 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.467402 345766 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc00041a570 8 D0713 08:45:19.467414 345766 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:19.467635 345766 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.467656 345766 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc00041a570 9 D0713 08:45:19.467670 345766 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:19.467757 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.467783 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 10 D0713 08:45:19.467794 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:19.476000 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.476035 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 11 D0713 08:45:19.476052 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:19.478331 345766 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.478365 345766 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc00041a570 12 D0713 08:45:19.478380 345766 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:19.478431 345766 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.478465 345766 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc00041a570 13 D0713 08:45:19.478481 345766 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:19.478727 345766 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 08:45:19.478826 345766 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0713 08:45:19.485541 345766 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.485567 345766 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc00041a570 14 D0713 08:45:19.485575 345766 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:19.485633 345766 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.485653 345766 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.485678 345766 task_signals.go:204] [ 772: 775] Signal 772, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.485701 345766 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.485693 345766 task_signals.go:204] [ 772: 774] Signal 772, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.485710 345766 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.485731 345766 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.485762 345766 task_signals.go:204] [ 772: 776] Signal 772, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.485780 345766 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.485774 345766 task_signals.go:204] [ 772: 773] Signal 772, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.485796 345766 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.485804 345766 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.485826 345766 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.485863 345766 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.485871 345766 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.485885 345766 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.487145 345766 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.487169 345766 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.487190 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.487216 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:19.487237 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.487327 345766 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.487941 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.489763 345766 syscalls.go:262] [ 777: 777] Allocating stack with size of 8388608 bytes D0713 08:45:19.489875 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.491117 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.491161 345766 usertrap_amd64.go:106] [ 777: 777] Map a usertrap vma at 62000 D0713 08:45:19.491253 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 1 D0713 08:45:19.491272 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:19.492059 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.492082 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 2 D0713 08:45:19.492097 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:19.492745 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.492771 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 3 D0713 08:45:19.492778 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:19.499649 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.499676 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 4 D0713 08:45:19.499685 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:19.500694 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.500715 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 5 D0713 08:45:19.500731 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:19.500785 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.500791 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 6 D0713 08:45:19.500796 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:19.501129 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.501162 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 7 D0713 08:45:19.501179 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:19.501377 345766 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.501408 345766 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc00041a660 8 D0713 08:45:19.501420 345766 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:19.501805 345766 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.501827 345766 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc00041a660 9 D0713 08:45:19.501840 345766 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:19.501938 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.501955 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 10 D0713 08:45:19.501965 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:19.502086 345766 usertrap_amd64.go:212] [ 777: 780] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.502114 345766 usertrap_amd64.go:122] [ 777: 780] Allocate a new trap: 0xc00041a660 11 D0713 08:45:19.502126 345766 usertrap_amd64.go:225] [ 777: 780] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:19.508844 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.508882 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 12 D0713 08:45:19.508896 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:19.512766 345766 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.512807 345766 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc00041a660 13 D0713 08:45:19.512823 345766 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:19.512871 345766 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.512880 345766 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc00041a660 14 D0713 08:45:19.512892 345766 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:19.512911 345766 task_signals.go:470] [ 777: 777] Notified of signal 23 D0713 08:45:19.513016 345766 task_signals.go:220] [ 777: 777] Signal 23: delivering to handler D0713 08:45:19.519055 345766 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.519080 345766 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc00041a660 15 D0713 08:45:19.519114 345766 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:19.519165 345766 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.519185 345766 task_signals.go:204] [ 777: 779] Signal 777, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.519195 345766 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.519206 345766 task_signals.go:204] [ 777: 780] Signal 777, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.519215 345766 task_signals.go:204] [ 777: 782] Signal 777, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.519208 345766 task_signals.go:204] [ 777: 781] Signal 777, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.519225 345766 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.519241 345766 task_signals.go:204] [ 777: 778] Signal 777, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.519255 345766 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.519271 345766 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.519282 345766 task_exit.go:204] [ 777: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.519287 345766 task_exit.go:204] [ 777: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.519291 345766 task_exit.go:204] [ 777: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.519297 345766 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.519302 345766 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.519306 345766 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.519313 345766 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.519318 345766 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.519322 345766 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.519331 345766 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.520375 345766 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.520393 345766 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.520403 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.520429 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.520438 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.520576 345766 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.520678 345766 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 08:45:19.520734 345766 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 08:45:19.521194 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.522333 345766 syscalls.go:262] [ 783: 783] Allocating stack with size of 8388608 bytes D0713 08:45:19.522451 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.523452 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.523516 345766 usertrap_amd64.go:106] [ 783: 783] Map a usertrap vma at 61000 D0713 08:45:19.523607 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 1 D0713 08:45:19.523645 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:19.524091 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.524121 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 2 D0713 08:45:19.524133 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:19.524739 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.524764 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 3 D0713 08:45:19.524773 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:19.529618 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.529635 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 4 D0713 08:45:19.529646 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:19.530633 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.530653 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 5 D0713 08:45:19.530661 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:19.530704 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.530708 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 6 D0713 08:45:19.530713 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:19.530856 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.530867 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 7 D0713 08:45:19.530872 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:19.530936 345766 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.530948 345766 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc001026ab0 8 D0713 08:45:19.530953 345766 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:19.531072 345766 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.531099 345766 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc001026ab0 9 D0713 08:45:19.531132 345766 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:19.531145 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.531156 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 10 D0713 08:45:19.531172 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:19.538967 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.539009 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 11 D0713 08:45:19.539026 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:19.541801 345766 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.541837 345766 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc001026ab0 12 D0713 08:45:19.541849 345766 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:19.541922 345766 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.541937 345766 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc001026ab0 13 D0713 08:45:19.541943 345766 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:19.541963 345766 task_signals.go:470] [ 783: 783] Notified of signal 23 D0713 08:45:19.542031 345766 task_signals.go:220] [ 783: 783] Signal 23: delivering to handler D0713 08:45:19.552422 345766 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.552478 345766 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc001026ab0 14 D0713 08:45:19.552464 345766 task_signals.go:470] [ 783: 783] Notified of signal 23 D0713 08:45:19.552495 345766 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:19.552542 345766 task_signals.go:220] [ 783: 783] Signal 23: delivering to handler D0713 08:45:19.552661 345766 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.552712 345766 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.552714 345766 task_signals.go:204] [ 783: 787] Signal 783, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.552750 345766 task_signals.go:204] [ 783: 784] Signal 783, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.552754 345766 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.552770 345766 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.552782 345766 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.552803 345766 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.552819 345766 task_signals.go:204] [ 783: 785] Signal 783, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.552832 345766 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.552838 345766 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.552841 345766 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.552856 345766 task_signals.go:204] [ 783: 786] Signal 783, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.552870 345766 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.552888 345766 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.552928 345766 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.554573 345766 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.554594 345766 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.554604 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.554677 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.554701 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.554734 345766 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.555879 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.557858 345766 syscalls.go:262] [ 788: 788] Allocating stack with size of 8388608 bytes D0713 08:45:19.558024 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.559085 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.559137 345766 usertrap_amd64.go:106] [ 788: 788] Map a usertrap vma at 65000 D0713 08:45:19.559257 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 1 D0713 08:45:19.559310 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:19.559755 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.559784 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 2 D0713 08:45:19.559872 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:19.560712 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.560743 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 3 D0713 08:45:19.560758 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:19.566519 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.566553 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 4 D0713 08:45:19.566569 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:19.567649 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.567666 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 5 D0713 08:45:19.567681 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:19.567787 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.567797 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 6 D0713 08:45:19.567808 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:19.568138 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.568164 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 7 D0713 08:45:19.568175 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:19.568380 345766 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.568402 345766 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc001ed2d50 8 D0713 08:45:19.568413 345766 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:19.568544 345766 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.568574 345766 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc001ed2d50 9 D0713 08:45:19.568587 345766 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:19.568757 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.568787 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 10 D0713 08:45:19.568800 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:19.568858 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.568881 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 11 D0713 08:45:19.568890 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:19.577042 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.577070 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 12 D0713 08:45:19.577084 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:19.580009 345766 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.580043 345766 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc001ed2d50 13 D0713 08:45:19.580058 345766 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:19.580170 345766 usertrap_amd64.go:212] [ 788: 789] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.580178 345766 usertrap_amd64.go:122] [ 788: 789] Allocate a new trap: 0xc001ed2d50 14 D0713 08:45:19.580185 345766 usertrap_amd64.go:225] [ 788: 789] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:19.580203 345766 task_signals.go:470] [ 788: 788] Notified of signal 23 D0713 08:45:19.580315 345766 task_signals.go:220] [ 788: 788] Signal 23: delivering to handler D0713 08:45:19.588612 345766 usertrap_amd64.go:212] [ 788: 788] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.588669 345766 usertrap_amd64.go:122] [ 788: 788] Allocate a new trap: 0xc001ed2d50 15 D0713 08:45:19.588695 345766 usertrap_amd64.go:225] [ 788: 788] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 08:45:19.588788 345766 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.588833 345766 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.588872 345766 task_signals.go:204] [ 788: 792] Signal 788, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.588887 345766 task_signals.go:204] [ 788: 790] Signal 788, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.588905 345766 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.588970 345766 task_signals.go:204] [ 788: 791] Signal 788, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.588995 345766 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.589009 345766 task_signals.go:204] [ 788: 789] Signal 788, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.589022 345766 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.589040 345766 task_exit.go:204] [ 788: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.589054 345766 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.589060 345766 task_exit.go:204] [ 788: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.589070 345766 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.589075 345766 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.589079 345766 task_exit.go:204] [ 788: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.589086 345766 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.590557 345766 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.590586 345766 task_exit.go:204] [ 788: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.590605 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.590631 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.590640 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.590725 345766 task_exit.go:204] [ 788: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.591428 345766 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.593068 345766 syscalls.go:262] [ 793: 793] Allocating stack with size of 8388608 bytes D0713 08:45:19.593225 345766 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.594727 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.594769 345766 usertrap_amd64.go:106] [ 793: 793] Map a usertrap vma at 67000 D0713 08:45:19.595201 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 1 D0713 08:45:19.595238 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:19.595529 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.595551 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 2 D0713 08:45:19.595563 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:19.595972 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.595989 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 3 D0713 08:45:19.596026 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:19.602122 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.602170 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 4 D0713 08:45:19.602188 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:19.603437 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.603475 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 5 D0713 08:45:19.603485 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:19.603543 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.603556 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 6 D0713 08:45:19.603565 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:19.603939 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.603954 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 7 D0713 08:45:19.603963 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:19.604113 345766 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.604129 345766 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc001fbade0 8 D0713 08:45:19.604137 345766 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:19.604320 345766 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.604340 345766 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc001fbade0 9 D0713 08:45:19.604350 345766 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:19.604445 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.604471 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 10 D0713 08:45:19.604489 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:19.604539 345766 usertrap_amd64.go:212] [ 793: 795] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.604564 345766 usertrap_amd64.go:122] [ 793: 795] Allocate a new trap: 0xc001fbade0 11 D0713 08:45:19.604575 345766 usertrap_amd64.go:225] [ 793: 795] Apply the binary patch addr 46b6e0 trap addr 67370 ([184 24 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:19.611582 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.611614 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 12 D0713 08:45:19.611629 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:19.615786 345766 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.615810 345766 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc001fbade0 13 D0713 08:45:19.615819 345766 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:19.615864 345766 usertrap_amd64.go:212] [ 793: 794] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.615871 345766 usertrap_amd64.go:122] [ 793: 794] Allocate a new trap: 0xc001fbade0 14 D0713 08:45:19.615883 345766 usertrap_amd64.go:225] [ 793: 794] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:19.615958 345766 task_signals.go:470] [ 793: 793] Notified of signal 23 D0713 08:45:19.616051 345766 task_signals.go:220] [ 793: 793] Signal 23: delivering to handler D0713 08:45:19.622333 345766 usertrap_amd64.go:212] [ 793: 793] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.622350 345766 usertrap_amd64.go:122] [ 793: 793] Allocate a new trap: 0xc001fbade0 15 D0713 08:45:19.622360 345766 usertrap_amd64.go:225] [ 793: 793] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 08:45:19.622425 345766 task_exit.go:204] [ 793: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.622460 345766 task_exit.go:204] [ 793: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.622476 345766 task_signals.go:204] [ 793: 795] Signal 793, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.622497 345766 task_exit.go:204] [ 793: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.622499 345766 task_signals.go:204] [ 793: 794] Signal 793, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.622483 345766 task_signals.go:204] [ 793: 796] Signal 793, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.622529 345766 task_exit.go:204] [ 793: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.622537 345766 task_exit.go:204] [ 793: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.622553 345766 task_signals.go:204] [ 793: 797] Signal 793, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.622570 345766 task_exit.go:204] [ 793: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.622575 345766 task_exit.go:204] [ 793: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.622579 345766 task_exit.go:204] [ 793: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.622588 345766 task_exit.go:204] [ 793: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.622594 345766 task_exit.go:204] [ 793: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.622598 345766 task_exit.go:204] [ 793: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.622607 345766 task_signals.go:204] [ 793: 798] Signal 793, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.622613 345766 task_exit.go:204] [ 793: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.622617 345766 task_exit.go:204] [ 793: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.622620 345766 task_exit.go:204] [ 793: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.622630 345766 task_exit.go:204] [ 793: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.623834 345766 task_exit.go:204] [ 793: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.623892 345766 task_exit.go:204] [ 793: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.623938 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.623970 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.623982 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.624108 345766 task_exit.go:204] [ 793: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.625215 345766 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.626450 345766 syscalls.go:262] [ 799: 799] Allocating stack with size of 8388608 bytes D0713 08:45:19.626585 345766 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.627610 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.627649 345766 usertrap_amd64.go:106] [ 799: 799] Map a usertrap vma at 65000 D0713 08:45:19.627728 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 1 D0713 08:45:19.627742 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:19.628235 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.628259 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 2 D0713 08:45:19.628282 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:19.628855 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.628873 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 3 D0713 08:45:19.628883 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:19.633842 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.633856 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 4 D0713 08:45:19.633865 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:19.634797 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.634823 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 5 D0713 08:45:19.634831 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:19.634897 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.634918 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 6 D0713 08:45:19.634927 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:19.635120 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.635141 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 7 D0713 08:45:19.635149 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:19.635211 345766 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.635227 345766 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc001027140 8 D0713 08:45:19.635236 345766 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:19.635377 345766 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.635408 345766 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc001027140 9 D0713 08:45:19.635418 345766 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:19.635433 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.635440 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 10 D0713 08:45:19.635468 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:19.642287 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.642311 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 11 D0713 08:45:19.642319 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:19.645924 345766 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.645951 345766 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc001027140 12 D0713 08:45:19.645962 345766 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:19.646035 345766 usertrap_amd64.go:212] [ 799: 800] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.646060 345766 usertrap_amd64.go:122] [ 799: 800] Allocate a new trap: 0xc001027140 13 D0713 08:45:19.646071 345766 usertrap_amd64.go:225] [ 799: 800] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:19.646134 345766 task_signals.go:470] [ 799: 799] Notified of signal 23 D0713 08:45:19.646211 345766 task_signals.go:220] [ 799: 799] Signal 23: delivering to handler D0713 08:45:19.653254 345766 usertrap_amd64.go:212] [ 799: 799] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.653283 345766 usertrap_amd64.go:122] [ 799: 799] Allocate a new trap: 0xc001027140 14 D0713 08:45:19.653293 345766 usertrap_amd64.go:225] [ 799: 799] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:19.653351 345766 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.653370 345766 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.653387 345766 task_signals.go:204] [ 799: 800] Signal 799, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.653399 345766 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.653405 345766 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.653419 345766 task_exit.go:204] [ 799: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.653453 345766 task_signals.go:204] [ 799: 803] Signal 799, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.653464 345766 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.653474 345766 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.653482 345766 task_exit.go:204] [ 799: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.653514 345766 task_signals.go:204] [ 799: 801] Signal 799, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.653534 345766 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.653541 345766 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.653549 345766 task_exit.go:204] [ 799: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.653485 345766 task_signals.go:204] [ 799: 802] Signal 799, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.653570 345766 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.654739 345766 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.654759 345766 task_exit.go:204] [ 799: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.654768 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.654874 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.654905 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.654985 345766 task_exit.go:204] [ 799: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.655691 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.657031 345766 syscalls.go:262] [ 804: 804] Allocating stack with size of 8388608 bytes D0713 08:45:19.657139 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.658105 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.658134 345766 usertrap_amd64.go:106] [ 804: 804] Map a usertrap vma at 64000 D0713 08:45:19.658239 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 1 D0713 08:45:19.658264 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:19.658549 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.658565 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 2 D0713 08:45:19.658571 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:19.658961 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.658989 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 3 D0713 08:45:19.659000 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:19.664035 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.664057 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 4 D0713 08:45:19.664065 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:19.665632 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.665651 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 5 D0713 08:45:19.665659 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:19.665683 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.665687 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 6 D0713 08:45:19.665693 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:19.666018 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.666031 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 7 D0713 08:45:19.666037 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:19.666100 345766 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.666105 345766 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001d12090 8 D0713 08:45:19.666111 345766 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:19.666302 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.666322 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 9 D0713 08:45:19.666333 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:19.666348 345766 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.666354 345766 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001d12090 10 D0713 08:45:19.666405 345766 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:19.673185 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.673205 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 11 D0713 08:45:19.673213 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:19.677106 345766 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.677155 345766 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001d12090 12 D0713 08:45:19.677171 345766 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:19.677304 345766 usertrap_amd64.go:212] [ 804: 805] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.677318 345766 usertrap_amd64.go:122] [ 804: 805] Allocate a new trap: 0xc001d12090 13 D0713 08:45:19.677331 345766 usertrap_amd64.go:225] [ 804: 805] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:19.677410 345766 task_signals.go:470] [ 804: 804] Notified of signal 23 D0713 08:45:19.677526 345766 task_signals.go:220] [ 804: 804] Signal 23: delivering to handler D0713 08:45:19.683990 345766 usertrap_amd64.go:212] [ 804: 804] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.684022 345766 usertrap_amd64.go:122] [ 804: 804] Allocate a new trap: 0xc001d12090 14 D0713 08:45:19.684034 345766 usertrap_amd64.go:225] [ 804: 804] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:19.684109 345766 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.684133 345766 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.684160 345766 task_signals.go:204] [ 804: 807] Signal 804, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.684187 345766 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.684194 345766 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.684199 345766 task_exit.go:204] [ 804: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.684184 345766 task_signals.go:204] [ 804: 806] Signal 804, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.684220 345766 task_signals.go:204] [ 804: 805] Signal 804, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.684229 345766 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.684260 345766 task_signals.go:204] [ 804: 808] Signal 804, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.684277 345766 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.684283 345766 task_exit.go:204] [ 804: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.684300 345766 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.684311 345766 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.684316 345766 task_exit.go:204] [ 804: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.684327 345766 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.685615 345766 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.685657 345766 task_exit.go:204] [ 804: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.685682 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.685730 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.685778 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.685877 345766 task_exit.go:204] [ 804: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.686474 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.688349 345766 syscalls.go:262] [ 809: 809] Allocating stack with size of 8388608 bytes D0713 08:45:19.688455 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.689776 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.689813 345766 usertrap_amd64.go:106] [ 809: 809] Map a usertrap vma at 67000 D0713 08:45:19.689892 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 1 D0713 08:45:19.689918 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:19.690375 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.690405 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 2 D0713 08:45:19.690416 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:19.691117 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.691147 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 3 D0713 08:45:19.691165 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:19.696450 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.696473 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 4 D0713 08:45:19.696483 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:19.697633 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.697654 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 5 D0713 08:45:19.697662 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:19.697722 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.697730 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 6 D0713 08:45:19.697739 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:19.697950 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.697972 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 7 D0713 08:45:19.697979 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:19.698099 345766 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.698119 345766 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc001fbb4d0 8 D0713 08:45:19.698130 345766 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:19.698313 345766 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.698345 345766 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc001fbb4d0 9 D0713 08:45:19.698356 345766 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:19.698395 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.698408 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 10 D0713 08:45:19.698416 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:19.706707 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.706730 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 11 D0713 08:45:19.706739 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:19.709504 345766 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.709535 345766 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc001fbb4d0 12 D0713 08:45:19.709546 345766 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:19.709634 345766 usertrap_amd64.go:212] [ 809: 810] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.709716 345766 usertrap_amd64.go:122] [ 809: 810] Allocate a new trap: 0xc001fbb4d0 13 D0713 08:45:19.709739 345766 usertrap_amd64.go:225] [ 809: 810] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:19.709823 345766 task_signals.go:470] [ 809: 809] Notified of signal 23 D0713 08:45:19.709908 345766 task_signals.go:220] [ 809: 809] Signal 23: delivering to handler D0713 08:45:19.718367 345766 usertrap_amd64.go:212] [ 809: 809] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.718400 345766 usertrap_amd64.go:122] [ 809: 809] Allocate a new trap: 0xc001fbb4d0 14 D0713 08:45:19.718416 345766 usertrap_amd64.go:225] [ 809: 809] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:19.718490 345766 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.718524 345766 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.718537 345766 task_signals.go:204] [ 809: 810] Signal 809, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.718550 345766 task_signals.go:204] [ 809: 811] Signal 809, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.718560 345766 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.718575 345766 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.718580 345766 task_exit.go:204] [ 809: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.718594 345766 task_signals.go:204] [ 809: 812] Signal 809, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.718612 345766 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.718618 345766 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.718623 345766 task_exit.go:204] [ 809: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.718602 345766 task_signals.go:204] [ 809: 813] Signal 809, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.718635 345766 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.718641 345766 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.718644 345766 task_exit.go:204] [ 809: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.718651 345766 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.720275 345766 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.720296 345766 task_exit.go:204] [ 809: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.720307 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.720393 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.720432 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.720538 345766 task_exit.go:204] [ 809: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.721609 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.722799 345766 syscalls.go:262] [ 814: 814] Allocating stack with size of 8388608 bytes D0713 08:45:19.722894 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.724423 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.724468 345766 usertrap_amd64.go:106] [ 814: 814] Map a usertrap vma at 62000 D0713 08:45:19.724583 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 1 D0713 08:45:19.724614 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:19.725151 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.725189 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 2 D0713 08:45:19.725204 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:19.725924 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.725944 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 3 D0713 08:45:19.725958 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:19.733059 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.733098 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 4 D0713 08:45:19.733116 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:19.734425 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.734448 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 5 D0713 08:45:19.734460 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:19.734523 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.734530 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 6 D0713 08:45:19.734536 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:19.735013 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.735044 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 7 D0713 08:45:19.735052 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:19.735381 345766 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.735438 345766 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc001027890 8 D0713 08:45:19.735460 345766 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:19.735754 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.735793 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 9 D0713 08:45:19.735809 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:19.735839 345766 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.735849 345766 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc001027890 10 D0713 08:45:19.735863 345766 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:19.736638 345766 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.736704 345766 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc001027890 11 D0713 08:45:19.736727 345766 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:19.736804 345766 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.736826 345766 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc001027890 12 D0713 08:45:19.736837 345766 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:19.736899 345766 task_signals.go:470] [ 814: 814] Notified of signal 23 D0713 08:45:19.737179 345766 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler D0713 08:45:19.745021 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.745055 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 13 D0713 08:45:19.745068 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:19.747812 345766 task_signals.go:470] [ 814: 814] Notified of signal 23 D0713 08:45:19.747886 345766 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler I0713 08:45:19.756681 345766 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 08:45:19.756784 345766 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.756805 345766 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc001027890 14 D0713 08:45:19.756819 345766 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:19.756900 345766 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.756968 345766 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.756964 345766 task_signals.go:204] [ 814: 815] Signal 814, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.757006 345766 task_signals.go:204] [ 814: 817] Signal 814, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.757012 345766 task_signals.go:204] [ 814: 818] Signal 814, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.757025 345766 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.757065 345766 task_signals.go:204] [ 814: 816] Signal 814, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.757081 345766 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.757097 345766 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.757109 345766 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.757124 345766 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.757129 345766 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.757140 345766 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.757185 345766 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.757194 345766 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.757206 345766 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.758729 345766 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.758751 345766 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.758765 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.758811 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.758826 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.758930 345766 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.759392 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.761092 345766 syscalls.go:262] [ 819: 819] Allocating stack with size of 8388608 bytes D0713 08:45:19.761256 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.763371 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.763431 345766 usertrap_amd64.go:106] [ 819: 819] Map a usertrap vma at 69000 D0713 08:45:19.763592 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 1 D0713 08:45:19.763718 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:19.764411 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.764440 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 2 D0713 08:45:19.764452 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:19.765426 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.765450 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 3 D0713 08:45:19.765460 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:19.771584 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.771621 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 4 D0713 08:45:19.771633 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:19.772822 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.772845 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 5 D0713 08:45:19.772852 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:19.773074 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.773105 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 6 D0713 08:45:19.773119 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:19.773567 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.773583 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 7 D0713 08:45:19.773590 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:19.773724 345766 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.773746 345766 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc001fbb830 8 D0713 08:45:19.773756 345766 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:19.773901 345766 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.773922 345766 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc001fbb830 9 D0713 08:45:19.773930 345766 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:19.774030 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.774058 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 10 D0713 08:45:19.774073 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:19.783814 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.783838 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 11 D0713 08:45:19.783849 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:19.784260 345766 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.784279 345766 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc001fbb830 12 D0713 08:45:19.784285 345766 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:19.784300 345766 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.784303 345766 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc001fbb830 13 D0713 08:45:19.784309 345766 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:19.784326 345766 task_signals.go:470] [ 819: 819] Notified of signal 23 D0713 08:45:19.784341 345766 task_signals.go:179] [ 819: 819] Restarting syscall 202: interrupted by signal 23 D0713 08:45:19.784351 345766 task_signals.go:220] [ 819: 819] Signal 23: delivering to handler D0713 08:45:19.795058 345766 task_signals.go:470] [ 819: 819] Notified of signal 23 D0713 08:45:19.795550 345766 task_signals.go:220] [ 819: 819] Signal 23: delivering to handler I0713 08:45:19.796070 345766 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 08:45:19.796189 345766 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.796208 345766 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001fbb830 14 D0713 08:45:19.796217 345766 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:19.796280 345766 task_exit.go:204] [ 819: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.796297 345766 task_exit.go:204] [ 819: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.796316 345766 task_signals.go:204] [ 819: 822] Signal 819, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.796340 345766 task_exit.go:204] [ 819: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.796345 345766 task_exit.go:204] [ 819: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.796341 345766 task_signals.go:204] [ 819: 820] Signal 819, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.796349 345766 task_exit.go:204] [ 819: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.796317 345766 task_signals.go:204] [ 819: 821] Signal 819, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.796361 345766 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0713 08:45:19.796373 345766 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0713 08:45:19.796375 345766 task_signals.go:204] [ 819: 823] Signal 819, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.796408 345766 task_exit.go:204] [ 819: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.796425 345766 task_signals.go:204] [ 819: 824] Signal 819, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.796443 345766 task_exit.go:204] [ 819: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.796449 345766 task_exit.go:204] [ 819: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.796459 345766 task_exit.go:204] [ 819: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.796489 345766 task_exit.go:204] [ 819: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.796495 345766 task_exit.go:204] [ 819: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.796503 345766 task_exit.go:204] [ 819: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.796518 345766 task_exit.go:204] [ 819: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.796522 345766 task_exit.go:204] [ 819: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.796531 345766 task_exit.go:204] [ 819: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.797952 345766 task_exit.go:204] [ 819: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.797980 345766 task_exit.go:204] [ 819: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.798017 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.798039 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.798052 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.798303 345766 task_exit.go:204] [ 819: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.798744 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.800462 345766 syscalls.go:262] [ 825: 825] Allocating stack with size of 8388608 bytes D0713 08:45:19.800558 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.802377 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.802435 345766 usertrap_amd64.go:106] [ 825: 825] Map a usertrap vma at 62000 D0713 08:45:19.802569 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 1 D0713 08:45:19.802633 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:19.803214 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.803237 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 2 D0713 08:45:19.803246 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:19.804072 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.804096 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 3 D0713 08:45:19.804104 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:19.811330 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.811432 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 4 D0713 08:45:19.811457 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:19.812671 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.812711 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 5 D0713 08:45:19.812724 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:19.812800 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.812821 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 6 D0713 08:45:19.812835 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:19.813124 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.813144 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 7 D0713 08:45:19.813156 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:19.813355 345766 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.813375 345766 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc001027b60 8 D0713 08:45:19.813384 345766 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:19.813624 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.813642 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 9 D0713 08:45:19.813657 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:19.813672 345766 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.813680 345766 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc001027b60 10 D0713 08:45:19.813687 345766 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:19.822023 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.822057 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 11 D0713 08:45:19.822070 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:19.824611 345766 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.824633 345766 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc001027b60 12 D0713 08:45:19.824643 345766 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:19.824713 345766 usertrap_amd64.go:212] [ 825: 826] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.824730 345766 usertrap_amd64.go:122] [ 825: 826] Allocate a new trap: 0xc001027b60 13 D0713 08:45:19.824740 345766 usertrap_amd64.go:225] [ 825: 826] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:19.824800 345766 task_signals.go:470] [ 825: 825] Notified of signal 23 D0713 08:45:19.824901 345766 task_signals.go:220] [ 825: 825] Signal 23: delivering to handler I0713 08:45:19.832895 345766 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 08:45:19.833068 345766 usertrap_amd64.go:212] [ 825: 825] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.833133 345766 usertrap_amd64.go:122] [ 825: 825] Allocate a new trap: 0xc001027b60 14 D0713 08:45:19.833149 345766 usertrap_amd64.go:225] [ 825: 825] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:19.833243 345766 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.833290 345766 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.833310 345766 task_signals.go:204] [ 825: 828] Signal 825, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.833329 345766 task_signals.go:204] [ 825: 826] Signal 825, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.833344 345766 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.833375 345766 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.833383 345766 task_exit.go:204] [ 825: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.833325 345766 task_signals.go:204] [ 825: 827] Signal 825, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.833414 345766 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.833423 345766 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.833439 345766 task_exit.go:204] [ 825: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.833466 345766 task_signals.go:204] [ 825: 829] Signal 825, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.833478 345766 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.833493 345766 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.833507 345766 task_exit.go:204] [ 825: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.833519 345766 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.835127 345766 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.835151 345766 task_exit.go:204] [ 825: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.835164 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.835203 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.835216 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.835533 345766 task_exit.go:204] [ 825: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.835770 345766 task_signals.go:470] [ 6: 19] Notified of signal 23 D0713 08:45:19.835855 345766 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0713 08:45:19.836322 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.838304 345766 syscalls.go:262] [ 830: 830] Allocating stack with size of 8388608 bytes D0713 08:45:19.838477 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.839821 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.839867 345766 usertrap_amd64.go:106] [ 830: 830] Map a usertrap vma at 69000 D0713 08:45:19.839957 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 1 D0713 08:45:19.839978 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:19.840523 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.840579 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 2 D0713 08:45:19.840612 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:19.841674 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.841715 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 3 D0713 08:45:19.841728 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:19.849803 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.849888 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 4 D0713 08:45:19.849908 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:19.851482 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.851515 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 5 D0713 08:45:19.851536 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:19.851619 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.851637 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 6 D0713 08:45:19.851648 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:19.852136 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.852175 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 7 D0713 08:45:19.852185 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:19.852343 345766 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.852360 345766 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc00041b6b0 8 D0713 08:45:19.852370 345766 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:19.852553 345766 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.852588 345766 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc00041b6b0 9 D0713 08:45:19.852609 345766 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:19.852651 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.852678 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 10 D0713 08:45:19.852689 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:19.860014 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.860039 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 11 D0713 08:45:19.860047 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:19.862773 345766 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.862802 345766 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc00041b6b0 12 D0713 08:45:19.862821 345766 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:19.862887 345766 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.862912 345766 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc00041b6b0 13 D0713 08:45:19.862923 345766 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:19.862975 345766 task_signals.go:470] [ 830: 830] Notified of signal 23 D0713 08:45:19.863075 345766 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler D0713 08:45:19.870017 345766 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.870043 345766 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc00041b6b0 14 D0713 08:45:19.870053 345766 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:19.870100 345766 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.870120 345766 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.870131 345766 task_signals.go:204] [ 830: 831] Signal 830, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.870148 345766 task_signals.go:204] [ 830: 832] Signal 830, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.870153 345766 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.870139 345766 task_signals.go:204] [ 830: 833] Signal 830, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.870163 345766 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.870169 345766 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.870174 345766 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.870185 345766 task_signals.go:204] [ 830: 834] Signal 830, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.870188 345766 task_signals.go:204] [ 830: 835] Signal 830, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.870206 345766 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.870224 345766 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.870233 345766 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.870241 345766 task_exit.go:204] [ 830: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.870257 345766 task_exit.go:204] [ 830: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.870262 345766 task_exit.go:204] [ 830: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.870271 345766 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.870369 345766 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.870383 345766 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.871937 345766 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.871955 345766 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.871965 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.871992 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.872008 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.872123 345766 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.872868 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.874249 345766 syscalls.go:262] [ 836: 836] Allocating stack with size of 8388608 bytes D0713 08:45:19.874368 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.875806 345766 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.875885 345766 usertrap_amd64.go:106] [ 836: 836] Map a usertrap vma at 61000 D0713 08:45:19.876067 345766 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001027e30 1 D0713 08:45:19.876160 345766 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:19.876721 345766 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.876748 345766 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001027e30 2 D0713 08:45:19.876758 345766 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:19.877558 345766 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.877589 345766 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001027e30 3 D0713 08:45:19.877603 345766 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:19.883864 345766 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.883894 345766 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001027e30 4 D0713 08:45:19.883907 345766 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:19.884915 345766 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.884966 345766 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001027e30 5 D0713 08:45:19.884993 345766 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:19.885108 345766 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.885127 345766 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001027e30 6 D0713 08:45:19.885139 345766 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:19.885328 345766 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.885342 345766 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001027e30 7 D0713 08:45:19.885348 345766 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:19.885428 345766 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.885441 345766 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc001027e30 8 D0713 08:45:19.885448 345766 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:19.885577 345766 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.885595 345766 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc001027e30 9 D0713 08:45:19.885601 345766 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:19.885612 345766 usertrap_amd64.go:212] [ 836: 838] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.885617 345766 usertrap_amd64.go:122] [ 836: 838] Allocate a new trap: 0xc001027e30 10 D0713 08:45:19.885623 345766 usertrap_amd64.go:225] [ 836: 838] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:19.885646 345766 usertrap_amd64.go:212] [ 836: 838] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.885673 345766 usertrap_amd64.go:122] [ 836: 838] Allocate a new trap: 0xc001027e30 11 D0713 08:45:19.885690 345766 usertrap_amd64.go:225] [ 836: 838] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:19.893519 345766 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.893542 345766 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001027e30 12 D0713 08:45:19.893551 345766 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:19.896045 345766 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.896070 345766 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc001027e30 13 D0713 08:45:19.896085 345766 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:19.896148 345766 usertrap_amd64.go:212] [ 836: 837] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.896173 345766 usertrap_amd64.go:122] [ 836: 837] Allocate a new trap: 0xc001027e30 14 D0713 08:45:19.896186 345766 usertrap_amd64.go:225] [ 836: 837] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:19.896245 345766 task_signals.go:470] [ 836: 836] Notified of signal 23 D0713 08:45:19.896318 345766 task_signals.go:220] [ 836: 836] Signal 23: delivering to handler I0713 08:45:19.904288 345766 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 08:45:19.904354 345766 usertrap_amd64.go:212] [ 836: 836] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.904366 345766 usertrap_amd64.go:122] [ 836: 836] Allocate a new trap: 0xc001027e30 15 D0713 08:45:19.904379 345766 usertrap_amd64.go:225] [ 836: 836] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 08:45:19.904430 345766 task_exit.go:204] [ 836: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.904461 345766 task_exit.go:204] [ 836: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.904463 345766 task_signals.go:204] [ 836: 840] Signal 836, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.904483 345766 task_exit.go:204] [ 836: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.904497 345766 task_exit.go:204] [ 836: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.904503 345766 task_exit.go:204] [ 836: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.904534 345766 task_signals.go:204] [ 836: 838] Signal 836, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.904547 345766 task_signals.go:204] [ 836: 839] Signal 836, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.904561 345766 task_exit.go:204] [ 836: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.904567 345766 task_exit.go:204] [ 836: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.904571 345766 task_exit.go:204] [ 836: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.904525 345766 task_signals.go:204] [ 836: 837] Signal 836, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.904579 345766 task_exit.go:204] [ 836: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.904585 345766 task_exit.go:204] [ 836: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.904589 345766 task_exit.go:204] [ 836: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.904595 345766 task_exit.go:204] [ 836: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.906020 345766 task_exit.go:204] [ 836: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.906032 345766 task_exit.go:204] [ 836: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.906044 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.906083 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.906097 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.906186 345766 task_exit.go:204] [ 836: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.906233 345766 task_signals.go:470] [ 6: 8] Notified of signal 23 D0713 08:45:19.906291 345766 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0713 08:45:19.906685 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.908106 345766 syscalls.go:262] [ 841: 841] Allocating stack with size of 8388608 bytes D0713 08:45:19.908213 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.909161 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.909200 345766 usertrap_amd64.go:106] [ 841: 841] Map a usertrap vma at 60000 D0713 08:45:19.909279 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 1 D0713 08:45:19.909317 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:19.909584 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.909606 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 2 D0713 08:45:19.909615 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:19.910061 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.910082 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 3 D0713 08:45:19.910091 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:19.915020 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.915045 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 4 D0713 08:45:19.915054 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:19.916204 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.916228 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 5 D0713 08:45:19.916235 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:19.916281 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.916294 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 6 D0713 08:45:19.916300 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:19.916532 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.916550 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 7 D0713 08:45:19.916556 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:19.916625 345766 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.916637 345766 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc001bb04b0 8 D0713 08:45:19.916644 345766 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:19.916794 345766 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.916816 345766 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc001bb04b0 9 D0713 08:45:19.916823 345766 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:19.916856 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.916864 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 10 D0713 08:45:19.916873 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:19.924219 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.924249 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 11 D0713 08:45:19.924260 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:19.927321 345766 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.927351 345766 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc001bb04b0 12 D0713 08:45:19.927363 345766 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:19.927425 345766 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.927437 345766 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc001bb04b0 13 D0713 08:45:19.927497 345766 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:19.927546 345766 task_signals.go:470] [ 841: 841] Notified of signal 23 D0713 08:45:19.927641 345766 task_signals.go:220] [ 841: 841] Signal 23: delivering to handler I0713 08:45:19.935040 345766 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 08:45:19.935112 345766 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.935120 345766 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc001bb04b0 14 D0713 08:45:19.935127 345766 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:19.935154 345766 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.935179 345766 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.935187 345766 task_signals.go:204] [ 841: 842] Signal 841, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.935198 345766 task_signals.go:204] [ 841: 844] Signal 841, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.935210 345766 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.935221 345766 task_signals.go:204] [ 841: 843] Signal 841, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.935259 345766 task_signals.go:204] [ 841: 845] Signal 841, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.935277 345766 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.935297 345766 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.935302 345766 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.935312 345766 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.935319 345766 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.935327 345766 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.935342 345766 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.935366 345766 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.935376 345766 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.936442 345766 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.936459 345766 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.936468 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.936567 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.936582 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.936704 345766 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.937065 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.938350 345766 syscalls.go:262] [ 846: 846] Allocating stack with size of 8388608 bytes D0713 08:45:19.938456 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.939547 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.939599 345766 usertrap_amd64.go:106] [ 846: 846] Map a usertrap vma at 63000 D0713 08:45:19.939692 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 1 D0713 08:45:19.939720 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:19.939892 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.939911 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 2 D0713 08:45:19.939920 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:19.940369 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.940391 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 3 D0713 08:45:19.940400 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:19.945249 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.945275 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 4 D0713 08:45:19.945285 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:19.946238 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.946255 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 5 D0713 08:45:19.946264 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:19.946276 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.946281 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 6 D0713 08:45:19.946286 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:19.946535 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.946561 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 7 D0713 08:45:19.946575 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:19.946758 345766 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.946776 345766 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc000a7db60 8 D0713 08:45:19.946783 345766 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:19.946934 345766 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.946958 345766 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc000a7db60 9 D0713 08:45:19.946968 345766 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:19.947097 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.947130 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 10 D0713 08:45:19.947151 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:19.947456 345766 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.947481 345766 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc000a7db60 11 D0713 08:45:19.947492 345766 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:19.947561 345766 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.947577 345766 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc000a7db60 12 D0713 08:45:19.947587 345766 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:19.947602 345766 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 08:45:19.947677 345766 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler D0713 08:45:19.953617 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.953644 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 13 D0713 08:45:19.953652 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:19.958219 345766 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 08:45:19.958254 345766 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler D0713 08:45:19.958336 345766 usertrap_amd64.go:212] [ 846: 848] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:19.958347 345766 usertrap_amd64.go:122] [ 846: 848] Allocate a new trap: 0xc000a7db60 14 D0713 08:45:19.958357 345766 usertrap_amd64.go:225] [ 846: 848] Apply the binary patch addr 46b6e0 trap addr 63460 ([184 24 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:19.964781 345766 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:19.964809 345766 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc000a7db60 15 D0713 08:45:19.964824 345766 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 08:45:19.964881 345766 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.964902 345766 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.964917 345766 task_signals.go:204] [ 846: 849] Signal 846, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.964915 345766 task_signals.go:204] [ 846: 848] Signal 846, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.964928 345766 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.964994 345766 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.965018 345766 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.965034 345766 task_signals.go:204] [ 846: 847] Signal 846, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.965044 345766 task_signals.go:204] [ 846: 850] Signal 846, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.965051 345766 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.965059 345766 task_signals.go:204] [ 846: 851] Signal 846, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:19.965067 345766 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.965071 345766 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.965080 345766 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.965103 345766 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.965110 345766 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.965150 345766 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.965259 345766 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.965279 345766 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.965317 345766 task_exit.go:204] [ 846: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:19.966609 345766 task_exit.go:204] [ 846: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:19.966630 345766 task_exit.go:204] [ 846: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.966640 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:19.966665 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:19.966686 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:19.966847 345766 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:19.967389 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.968796 345766 syscalls.go:262] [ 852: 852] Allocating stack with size of 8388608 bytes D0713 08:45:19.969039 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:19.970267 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:19.970316 345766 usertrap_amd64.go:106] [ 852: 852] Map a usertrap vma at 63000 D0713 08:45:19.970467 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 1 D0713 08:45:19.970521 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:19.971008 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:19.971040 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 2 D0713 08:45:19.971056 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:19.971944 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:19.971964 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 3 D0713 08:45:19.971972 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:19.978411 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:19.978433 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 4 D0713 08:45:19.978441 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:19.979718 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:19.979776 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 5 D0713 08:45:19.979794 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:19.979850 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b214:sysno 13 D0713 08:45:19.979859 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 6 D0713 08:45:19.979899 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:19.980511 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:19.980539 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 7 D0713 08:45:19.980549 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:19.980756 345766 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:19.980796 345766 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc00059a0c0 8 D0713 08:45:19.980814 345766 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:19.981021 345766 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46af76:sysno 35 D0713 08:45:19.981055 345766 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc00059a0c0 9 D0713 08:45:19.981069 345766 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:19.981259 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:19.981291 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 10 D0713 08:45:19.981304 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:19.981794 345766 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b020:sysno 39 D0713 08:45:19.981822 345766 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc00059a0c0 11 D0713 08:45:19.981833 345766 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:19.981901 345766 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:19.981936 345766 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc00059a0c0 12 D0713 08:45:19.981953 345766 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:19.981975 345766 task_signals.go:470] [ 852: 852] Notified of signal 23 D0713 08:45:19.982029 345766 task_signals.go:220] [ 852: 852] Signal 23: delivering to handler D0713 08:45:19.989242 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46af29:sysno 293 D0713 08:45:19.989269 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 13 D0713 08:45:19.989279 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:19.992300 345766 task_signals.go:470] [ 852: 852] Notified of signal 23 D0713 08:45:19.992399 345766 task_signals.go:220] [ 852: 852] Signal 23: delivering to handler I0713 08:45:20.000626 345766 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 08:45:20.000719 345766 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.000730 345766 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc00059a0c0 14 D0713 08:45:20.000748 345766 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:20.000832 345766 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.000874 345766 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.000890 345766 task_signals.go:204] [ 852: 854] Signal 852, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.000894 345766 task_signals.go:204] [ 852: 855] Signal 852, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.000914 345766 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.000896 345766 task_signals.go:204] [ 852: 856] Signal 852, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.000918 345766 task_signals.go:204] [ 852: 853] Signal 852, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.000925 345766 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.001001 345766 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.001024 345766 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.001064 345766 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.001092 345766 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.001100 345766 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.001125 345766 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.001196 345766 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.001216 345766 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.002465 345766 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.002489 345766 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.002509 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.002563 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.002584 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.002856 345766 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.003666 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.005604 345766 syscalls.go:262] [ 857: 857] Allocating stack with size of 8388608 bytes D0713 08:45:20.005761 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.007011 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.007049 345766 usertrap_amd64.go:106] [ 857: 857] Map a usertrap vma at 66000 D0713 08:45:20.007121 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 1 D0713 08:45:20.007155 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:20.007424 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.007442 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 2 D0713 08:45:20.007449 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:20.007909 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.007929 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 3 D0713 08:45:20.007939 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:20.014750 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.014799 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 4 D0713 08:45:20.014816 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:20.015979 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.016010 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 5 D0713 08:45:20.016020 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:20.016083 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.016109 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 6 D0713 08:45:20.016120 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:20.016612 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.016630 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 7 D0713 08:45:20.016637 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:20.016781 345766 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.016809 345766 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc001d13140 8 D0713 08:45:20.016821 345766 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:20.017258 345766 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.017277 345766 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc001d13140 9 D0713 08:45:20.017289 345766 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:20.017306 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.017325 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 10 D0713 08:45:20.017340 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:20.017655 345766 usertrap_amd64.go:212] [ 857: 860] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.017676 345766 usertrap_amd64.go:122] [ 857: 860] Allocate a new trap: 0xc001d13140 11 D0713 08:45:20.017684 345766 usertrap_amd64.go:225] [ 857: 860] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:20.027309 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.027342 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 12 D0713 08:45:20.027354 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:20.029926 345766 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.029968 345766 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc001d13140 13 D0713 08:45:20.029981 345766 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:20.030059 345766 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.030077 345766 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc001d13140 14 D0713 08:45:20.030085 345766 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:20.030169 345766 task_signals.go:470] [ 857: 857] Notified of signal 23 D0713 08:45:20.030268 345766 task_signals.go:220] [ 857: 857] Signal 23: delivering to handler I0713 08:45:20.039664 345766 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 08:45:20.039763 345766 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.039776 345766 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc001d13140 15 D0713 08:45:20.039789 345766 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 08:45:20.039858 345766 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.039897 345766 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.039918 345766 task_signals.go:204] [ 857: 862] Signal 857, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.039923 345766 task_signals.go:204] [ 857: 859] Signal 857, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.039933 345766 task_signals.go:204] [ 857: 860] Signal 857, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.039944 345766 task_signals.go:204] [ 857: 858] Signal 857, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.039977 345766 task_exit.go:204] [ 857: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.040012 345766 task_signals.go:204] [ 857: 861] Signal 857, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.040045 345766 task_exit.go:204] [ 857: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.040056 345766 task_exit.go:204] [ 857: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.040075 345766 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.040085 345766 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.040091 345766 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.040100 345766 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.040114 345766 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.040120 345766 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.040133 345766 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.040141 345766 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.040147 345766 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.040163 345766 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.042185 345766 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.042483 345766 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.042510 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.042545 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.042554 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.042655 345766 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.043177 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.044590 345766 syscalls.go:262] [ 863: 863] Allocating stack with size of 8388608 bytes D0713 08:45:20.044734 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.046231 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.046267 345766 usertrap_amd64.go:106] [ 863: 863] Map a usertrap vma at 65000 D0713 08:45:20.046335 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 1 D0713 08:45:20.046351 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:20.046657 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.046672 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 2 D0713 08:45:20.046679 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:20.047321 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.047337 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 3 D0713 08:45:20.047343 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:20.052187 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.052210 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 4 D0713 08:45:20.052217 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:20.053614 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.053633 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 5 D0713 08:45:20.053639 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:20.053653 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.053657 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 6 D0713 08:45:20.053663 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:20.054025 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.054041 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 7 D0713 08:45:20.054046 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:20.054155 345766 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.054168 345766 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc000850090 8 D0713 08:45:20.054175 345766 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:20.054365 345766 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.054416 345766 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc000850090 9 D0713 08:45:20.054520 345766 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:20.054537 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.054552 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 10 D0713 08:45:20.054558 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:20.061930 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.061969 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 11 D0713 08:45:20.061977 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:20.065894 345766 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.065928 345766 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc000850090 12 D0713 08:45:20.065944 345766 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:20.065999 345766 usertrap_amd64.go:212] [ 863: 864] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.066040 345766 usertrap_amd64.go:122] [ 863: 864] Allocate a new trap: 0xc000850090 13 D0713 08:45:20.066048 345766 usertrap_amd64.go:225] [ 863: 864] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:20.066124 345766 task_signals.go:470] [ 863: 863] Notified of signal 23 D0713 08:45:20.066236 345766 task_signals.go:220] [ 863: 863] Signal 23: delivering to handler D0713 08:45:20.073062 345766 usertrap_amd64.go:212] [ 863: 863] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.073095 345766 usertrap_amd64.go:122] [ 863: 863] Allocate a new trap: 0xc000850090 14 D0713 08:45:20.073108 345766 usertrap_amd64.go:225] [ 863: 863] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:20.073462 345766 task_exit.go:204] [ 863: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.073492 345766 task_exit.go:204] [ 863: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.073520 345766 task_signals.go:204] [ 863: 866] Signal 863, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.073535 345766 task_exit.go:204] [ 863: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.073543 345766 task_exit.go:204] [ 863: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.073548 345766 task_exit.go:204] [ 863: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.073564 345766 task_signals.go:204] [ 863: 867] Signal 863, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.073587 345766 task_exit.go:204] [ 863: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.073594 345766 task_exit.go:204] [ 863: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.073599 345766 task_exit.go:204] [ 863: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.073542 345766 task_signals.go:204] [ 863: 864] Signal 863, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.073610 345766 task_exit.go:204] [ 863: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.073616 345766 task_exit.go:204] [ 863: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.073620 345766 task_exit.go:204] [ 863: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.073541 345766 task_signals.go:204] [ 863: 865] Signal 863, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.073634 345766 task_exit.go:204] [ 863: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.075174 345766 task_exit.go:204] [ 863: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.075206 345766 task_exit.go:204] [ 863: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.075220 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.075256 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.075271 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.075347 345766 task_exit.go:204] [ 863: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.075477 345766 task_signals.go:470] [ 6: 19] Notified of signal 23 D0713 08:45:20.075508 345766 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0713 08:45:20.076159 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.077569 345766 syscalls.go:262] [ 868: 868] Allocating stack with size of 8388608 bytes D0713 08:45:20.077686 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.079379 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.079425 345766 usertrap_amd64.go:106] [ 868: 868] Map a usertrap vma at 69000 D0713 08:45:20.079539 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 1 D0713 08:45:20.079569 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:20.080312 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.080345 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 2 D0713 08:45:20.080360 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:20.081303 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.081341 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 3 D0713 08:45:20.081355 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:20.087637 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.087735 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 4 D0713 08:45:20.087772 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:20.089535 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.089563 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 5 D0713 08:45:20.089576 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:20.089650 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.089671 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 6 D0713 08:45:20.089679 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:20.089982 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.090052 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 7 D0713 08:45:20.090080 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:20.090340 345766 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.090356 345766 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc001d132c0 8 D0713 08:45:20.090373 345766 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:20.090516 345766 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.090539 345766 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc001d132c0 9 D0713 08:45:20.090552 345766 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:20.090600 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.090617 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 10 D0713 08:45:20.090631 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:20.098401 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.098427 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 11 D0713 08:45:20.098436 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:20.101041 345766 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.101067 345766 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc001d132c0 12 D0713 08:45:20.101076 345766 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:20.101108 345766 usertrap_amd64.go:212] [ 868: 869] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.101117 345766 usertrap_amd64.go:122] [ 868: 869] Allocate a new trap: 0xc001d132c0 13 D0713 08:45:20.101124 345766 usertrap_amd64.go:225] [ 868: 869] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:20.101157 345766 task_signals.go:470] [ 868: 868] Notified of signal 23 D0713 08:45:20.101227 345766 task_signals.go:220] [ 868: 868] Signal 23: delivering to handler D0713 08:45:20.109622 345766 usertrap_amd64.go:212] [ 868: 868] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.109646 345766 usertrap_amd64.go:122] [ 868: 868] Allocate a new trap: 0xc001d132c0 14 D0713 08:45:20.109655 345766 usertrap_amd64.go:225] [ 868: 868] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:20.109715 345766 task_exit.go:204] [ 868: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.109731 345766 task_exit.go:204] [ 868: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.109751 345766 task_signals.go:204] [ 868: 871] Signal 868, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.109778 345766 task_exit.go:204] [ 868: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.109783 345766 task_exit.go:204] [ 868: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.109769 345766 task_signals.go:204] [ 868: 870] Signal 868, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.109788 345766 task_exit.go:204] [ 868: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.109828 345766 task_signals.go:204] [ 868: 872] Signal 868, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.109839 345766 task_signals.go:204] [ 868: 869] Signal 868, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.109854 345766 task_exit.go:204] [ 868: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.109896 345766 task_exit.go:204] [ 868: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.109913 345766 task_exit.go:204] [ 868: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.109941 345766 task_exit.go:204] [ 868: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.109950 345766 task_exit.go:204] [ 868: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.109961 345766 task_exit.go:204] [ 868: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.109970 345766 task_exit.go:204] [ 868: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.112333 345766 task_exit.go:204] [ 868: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.112367 345766 task_exit.go:204] [ 868: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.112384 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.112416 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.112424 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.112666 345766 task_exit.go:204] [ 868: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.113446 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.114875 345766 syscalls.go:262] [ 873: 873] Allocating stack with size of 8388608 bytes D0713 08:45:20.114989 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.116432 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.116463 345766 usertrap_amd64.go:106] [ 873: 873] Map a usertrap vma at 66000 D0713 08:45:20.116537 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 1 D0713 08:45:20.116556 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:20.117097 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.117134 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 2 D0713 08:45:20.117151 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:20.118603 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.118625 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 3 D0713 08:45:20.118637 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:20.125949 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.125978 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 4 D0713 08:45:20.125989 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:20.127252 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.127271 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 5 D0713 08:45:20.127281 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:20.127336 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.127350 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 6 D0713 08:45:20.127359 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:20.127639 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.127657 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 7 D0713 08:45:20.127664 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:20.127783 345766 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.127797 345766 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc000850120 8 D0713 08:45:20.127804 345766 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:20.127995 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.128023 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 9 D0713 08:45:20.128038 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:20.128083 345766 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.128108 345766 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc000850120 10 D0713 08:45:20.128120 345766 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:20.128566 345766 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.128590 345766 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc000850120 11 D0713 08:45:20.128602 345766 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:20.128627 345766 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.128633 345766 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc000850120 12 D0713 08:45:20.128655 345766 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:20.128759 345766 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 08:45:20.128794 345766 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler D0713 08:45:20.134999 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.135024 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 13 D0713 08:45:20.135033 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:20.138924 345766 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 08:45:20.138955 345766 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler D0713 08:45:20.145155 345766 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.145184 345766 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000850120 14 D0713 08:45:20.145194 345766 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:20.145248 345766 task_exit.go:204] [ 873: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.145263 345766 task_exit.go:204] [ 873: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.145281 345766 task_signals.go:204] [ 873: 876] Signal 873, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.145293 345766 task_exit.go:204] [ 873: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.145299 345766 task_exit.go:204] [ 873: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.145304 345766 task_exit.go:204] [ 873: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.145293 345766 task_signals.go:204] [ 873: 875] Signal 873, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.145316 345766 task_exit.go:204] [ 873: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.145365 345766 task_exit.go:204] [ 873: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.145373 345766 task_exit.go:204] [ 873: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.145315 345766 task_signals.go:204] [ 873: 874] Signal 873, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.145389 345766 task_signals.go:204] [ 873: 877] Signal 873, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.145395 345766 task_exit.go:204] [ 873: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.145411 345766 task_exit.go:204] [ 873: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.145426 345766 task_exit.go:204] [ 873: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.145436 345766 task_exit.go:204] [ 873: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.146815 345766 task_exit.go:204] [ 873: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.146835 345766 task_exit.go:204] [ 873: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.146845 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.146873 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.146881 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.146982 345766 task_exit.go:204] [ 873: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.147623 345766 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.149276 345766 syscalls.go:262] [ 878: 878] Allocating stack with size of 8388608 bytes D0713 08:45:20.149450 345766 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.150388 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.150449 345766 usertrap_amd64.go:106] [ 878: 878] Map a usertrap vma at 63000 D0713 08:45:20.150562 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 1 D0713 08:45:20.150601 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:20.151034 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.151044 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 2 D0713 08:45:20.151053 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:20.151668 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.151689 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 3 D0713 08:45:20.151696 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:20.158039 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.158064 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 4 D0713 08:45:20.158074 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:20.159741 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.159768 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 5 D0713 08:45:20.159784 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:20.159839 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.159862 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 6 D0713 08:45:20.159870 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:20.160118 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.160138 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 7 D0713 08:45:20.160147 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:20.160309 345766 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.160340 345766 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc00051b500 8 D0713 08:45:20.160352 345766 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:20.160505 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.160525 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 9 D0713 08:45:20.160533 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:20.160566 345766 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.160589 345766 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc00051b500 10 D0713 08:45:20.160601 345766 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:20.169348 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.169389 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 11 D0713 08:45:20.169401 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:20.171682 345766 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.171713 345766 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc00051b500 12 D0713 08:45:20.171731 345766 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:20.171800 345766 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.171820 345766 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc00051b500 13 D0713 08:45:20.171835 345766 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:20.171913 345766 task_signals.go:470] [ 878: 878] Notified of signal 23 D0713 08:45:20.172022 345766 task_signals.go:220] [ 878: 878] Signal 23: delivering to handler D0713 08:45:20.179295 345766 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.179323 345766 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc00051b500 14 D0713 08:45:20.179333 345766 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:20.179405 345766 task_exit.go:204] [ 878: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.179438 345766 task_signals.go:204] [ 878: 880] Signal 878, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.179468 345766 task_signals.go:204] [ 878: 882] Signal 878, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.179493 345766 task_exit.go:204] [ 878: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.179493 345766 task_signals.go:204] [ 878: 881] Signal 878, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.179515 345766 task_signals.go:204] [ 878: 879] Signal 878, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.179518 345766 task_exit.go:204] [ 878: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.179534 345766 task_exit.go:204] [ 878: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.179543 345766 task_exit.go:204] [ 878: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.179562 345766 task_exit.go:204] [ 878: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.179574 345766 task_exit.go:204] [ 878: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.179580 345766 task_exit.go:204] [ 878: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.179592 345766 task_exit.go:204] [ 878: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.179615 345766 task_exit.go:204] [ 878: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.179678 345766 task_exit.go:204] [ 878: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.179704 345766 task_exit.go:204] [ 878: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.181228 345766 task_exit.go:204] [ 878: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.181259 345766 task_exit.go:204] [ 878: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.181271 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.181318 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.181362 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.181397 345766 task_exit.go:204] [ 878: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.181967 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.183177 345766 syscalls.go:262] [ 883: 883] Allocating stack with size of 8388608 bytes D0713 08:45:20.183297 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.184669 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.184707 345766 usertrap_amd64.go:106] [ 883: 883] Map a usertrap vma at 60000 D0713 08:45:20.184771 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 1 D0713 08:45:20.184808 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:20.185370 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.185426 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 2 D0713 08:45:20.185440 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:20.186249 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.186279 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 3 D0713 08:45:20.186293 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) executing program D0713 08:45:20.192757 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.192791 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 4 D0713 08:45:20.192806 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:20.194069 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.194086 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 5 D0713 08:45:20.194097 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:20.194155 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.194168 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 6 D0713 08:45:20.194175 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:20.194561 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.194578 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 7 D0713 08:45:20.194584 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:20.194740 345766 usertrap_amd64.go:212] [ 883: 884] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.194783 345766 usertrap_amd64.go:122] [ 883: 884] Allocate a new trap: 0xc001d13c50 8 D0713 08:45:20.194801 345766 usertrap_amd64.go:225] [ 883: 884] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:20.194989 345766 usertrap_amd64.go:212] [ 883: 884] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.195020 345766 usertrap_amd64.go:122] [ 883: 884] Allocate a new trap: 0xc001d13c50 9 D0713 08:45:20.195040 345766 usertrap_amd64.go:225] [ 883: 884] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:20.195123 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.195145 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 10 D0713 08:45:20.195255 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:20.195350 345766 usertrap_amd64.go:212] [ 883: 884] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.195367 345766 usertrap_amd64.go:122] [ 883: 884] Allocate a new trap: 0xc001d13c50 11 D0713 08:45:20.195376 345766 usertrap_amd64.go:225] [ 883: 884] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:20.195402 345766 usertrap_amd64.go:212] [ 883: 884] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.195408 345766 usertrap_amd64.go:122] [ 883: 884] Allocate a new trap: 0xc001d13c50 12 D0713 08:45:20.195414 345766 usertrap_amd64.go:225] [ 883: 884] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:20.195488 345766 task_signals.go:470] [ 883: 886] Notified of signal 23 D0713 08:45:20.195524 345766 task_signals.go:179] [ 883: 886] Restarting syscall 202: interrupted by signal 23 D0713 08:45:20.195535 345766 task_signals.go:220] [ 883: 886] Signal 23: delivering to handler D0713 08:45:20.195872 345766 task_signals.go:470] [ 883: 883] Notified of signal 23 D0713 08:45:20.195967 345766 task_signals.go:220] [ 883: 883] Signal 23: delivering to handler D0713 08:45:20.205184 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.205263 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 13 D0713 08:45:20.205284 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:20.206487 345766 task_signals.go:470] [ 883: 883] Notified of signal 23 D0713 08:45:20.208046 345766 task_signals.go:220] [ 883: 883] Signal 23: delivering to handler D0713 08:45:20.208216 345766 task_signals.go:470] [ 883: 883] Notified of signal 23 D0713 08:45:20.208266 345766 task_signals.go:220] [ 883: 883] Signal 23: delivering to handler D0713 08:45:20.216581 345766 usertrap_amd64.go:212] [ 883: 883] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.216628 345766 usertrap_amd64.go:122] [ 883: 883] Allocate a new trap: 0xc001d13c50 14 D0713 08:45:20.216646 345766 usertrap_amd64.go:225] [ 883: 883] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:20.216723 345766 task_exit.go:204] [ 883: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.216748 345766 task_exit.go:204] [ 883: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.216765 345766 task_signals.go:204] [ 883: 884] Signal 883, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.216825 345766 task_exit.go:204] [ 883: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.216843 345766 task_exit.go:204] [ 883: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.216850 345766 task_exit.go:204] [ 883: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.216784 345766 task_signals.go:204] [ 883: 887] Signal 883, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.216867 345766 task_exit.go:204] [ 883: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.216874 345766 task_exit.go:204] [ 883: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.216879 345766 task_exit.go:204] [ 883: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.216790 345766 task_signals.go:204] [ 883: 886] Signal 883, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.216890 345766 task_exit.go:204] [ 883: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.216897 345766 task_exit.go:204] [ 883: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.216902 345766 task_exit.go:204] [ 883: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.216798 345766 task_signals.go:204] [ 883: 885] Signal 883, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.216927 345766 task_exit.go:204] [ 883: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.218499 345766 task_exit.go:204] [ 883: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.218522 345766 task_exit.go:204] [ 883: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.218537 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.218578 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.218598 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.218674 345766 task_exit.go:204] [ 883: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.219567 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.221222 345766 syscalls.go:262] [ 888: 888] Allocating stack with size of 8388608 bytes D0713 08:45:20.221326 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.222485 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.222531 345766 usertrap_amd64.go:106] [ 888: 888] Map a usertrap vma at 61000 D0713 08:45:20.222619 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 1 D0713 08:45:20.222642 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:20.222895 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.222909 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 2 D0713 08:45:20.222916 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:20.223419 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.223457 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 3 D0713 08:45:20.223472 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:20.229457 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.229515 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 4 D0713 08:45:20.229536 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:20.231671 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.231744 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 5 D0713 08:45:20.231776 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:20.231858 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.231875 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 6 D0713 08:45:20.231882 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:20.232325 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.232345 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 7 D0713 08:45:20.232351 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:20.232534 345766 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.232561 345766 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc00051b9b0 8 D0713 08:45:20.232573 345766 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:20.232788 345766 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.232804 345766 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc00051b9b0 9 D0713 08:45:20.232811 345766 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:20.232839 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.232845 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 10 D0713 08:45:20.232858 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:20.241107 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.241154 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 11 D0713 08:45:20.241170 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:20.244557 345766 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.244636 345766 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc00051b9b0 12 D0713 08:45:20.244656 345766 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:20.244752 345766 usertrap_amd64.go:212] [ 888: 889] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.244785 345766 usertrap_amd64.go:122] [ 888: 889] Allocate a new trap: 0xc00051b9b0 13 D0713 08:45:20.244803 345766 usertrap_amd64.go:225] [ 888: 889] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:20.244922 345766 task_signals.go:470] [ 888: 888] Notified of signal 23 D0713 08:45:20.245065 345766 task_signals.go:220] [ 888: 888] Signal 23: delivering to handler D0713 08:45:20.253625 345766 usertrap_amd64.go:212] [ 888: 888] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.253673 345766 usertrap_amd64.go:122] [ 888: 888] Allocate a new trap: 0xc00051b9b0 14 D0713 08:45:20.253689 345766 usertrap_amd64.go:225] [ 888: 888] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:20.253843 345766 task_exit.go:204] [ 888: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.253876 345766 task_exit.go:204] [ 888: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.253905 345766 task_signals.go:204] [ 888: 891] Signal 888, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.253918 345766 task_exit.go:204] [ 888: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.253925 345766 task_exit.go:204] [ 888: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.253929 345766 task_exit.go:204] [ 888: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.253961 345766 task_signals.go:204] [ 888: 889] Signal 888, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.253932 345766 task_signals.go:204] [ 888: 890] Signal 888, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.253979 345766 task_exit.go:204] [ 888: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.253973 345766 task_signals.go:204] [ 888: 892] Signal 888, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.254096 345766 task_exit.go:204] [ 888: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.254121 345766 task_exit.go:204] [ 888: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.254151 345766 task_exit.go:204] [ 888: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.254173 345766 task_exit.go:204] [ 888: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.254179 345766 task_exit.go:204] [ 888: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.254192 345766 task_exit.go:204] [ 888: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.255868 345766 task_exit.go:204] [ 888: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.255924 345766 task_exit.go:204] [ 888: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.255945 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.255987 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.256023 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.256113 345766 task_exit.go:204] [ 888: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.256719 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.258346 345766 syscalls.go:262] [ 893: 893] Allocating stack with size of 8388608 bytes D0713 08:45:20.258474 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.259913 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.259996 345766 usertrap_amd64.go:106] [ 893: 893] Map a usertrap vma at 68000 D0713 08:45:20.260125 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 1 D0713 08:45:20.260177 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:20.260735 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.260762 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 2 D0713 08:45:20.260772 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:20.261588 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.261609 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 3 D0713 08:45:20.261623 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:20.269201 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.269255 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 4 D0713 08:45:20.269287 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:20.270663 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.270697 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 5 D0713 08:45:20.270713 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:20.270763 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.270778 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 6 D0713 08:45:20.270787 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:20.271332 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.271364 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 7 D0713 08:45:20.271375 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:20.271622 345766 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.271645 345766 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc001bb1740 8 D0713 08:45:20.271664 345766 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:20.271922 345766 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.271946 345766 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc001bb1740 9 D0713 08:45:20.271958 345766 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:20.272024 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.272046 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 10 D0713 08:45:20.272055 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:20.281573 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.281601 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 11 D0713 08:45:20.281612 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:20.282665 345766 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.282710 345766 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc001bb1740 12 D0713 08:45:20.284879 345766 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:20.285037 345766 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.285084 345766 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc001bb1740 13 D0713 08:45:20.285103 345766 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:20.285183 345766 task_signals.go:470] [ 893: 893] Notified of signal 23 D0713 08:45:20.285356 345766 task_signals.go:220] [ 893: 893] Signal 23: delivering to handler D0713 08:45:20.293554 345766 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.293581 345766 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc001bb1740 14 D0713 08:45:20.293592 345766 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:20.293658 345766 task_exit.go:204] [ 893: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.293684 345766 task_exit.go:204] [ 893: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.293714 345766 task_signals.go:204] [ 893: 895] Signal 893, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.293743 345766 task_signals.go:204] [ 893: 897] Signal 893, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.293762 345766 task_exit.go:204] [ 893: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.293720 345766 task_signals.go:204] [ 893: 896] Signal 893, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.293772 345766 task_exit.go:204] [ 893: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.293777 345766 task_exit.go:204] [ 893: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.293743 345766 task_signals.go:204] [ 893: 894] Signal 893, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.293795 345766 task_exit.go:204] [ 893: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.293808 345766 task_exit.go:204] [ 893: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.293831 345766 task_exit.go:204] [ 893: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.293848 345766 task_exit.go:204] [ 893: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.293879 345766 task_exit.go:204] [ 893: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.293895 345766 task_exit.go:204] [ 893: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.293912 345766 task_exit.go:204] [ 893: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.295452 345766 task_exit.go:204] [ 893: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.295477 345766 task_exit.go:204] [ 893: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.295490 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.295514 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.295524 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.295676 345766 task_exit.go:204] [ 893: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.295858 345766 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 08:45:20.295922 345766 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 08:45:20.296436 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.298146 345766 syscalls.go:262] [ 898: 898] Allocating stack with size of 8388608 bytes D0713 08:45:20.298369 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.299646 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.299684 345766 usertrap_amd64.go:106] [ 898: 898] Map a usertrap vma at 61000 D0713 08:45:20.299768 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 1 D0713 08:45:20.299811 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:20.300317 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.300333 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 2 D0713 08:45:20.300343 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:20.300984 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.301010 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 3 D0713 08:45:20.301025 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:20.307576 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.307606 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 4 D0713 08:45:20.307616 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:20.309000 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.309032 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 5 D0713 08:45:20.309045 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:20.309154 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.309172 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 6 D0713 08:45:20.309180 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:20.309512 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.309539 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 7 D0713 08:45:20.309547 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:20.309811 345766 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.309867 345766 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc001bb1aa0 8 D0713 08:45:20.309891 345766 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:20.310184 345766 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.310217 345766 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc001bb1aa0 9 D0713 08:45:20.310233 345766 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:20.310407 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.310441 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 10 D0713 08:45:20.310454 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:20.318486 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.318523 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 11 D0713 08:45:20.318535 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:20.321168 345766 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.321240 345766 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc001bb1aa0 12 D0713 08:45:20.321260 345766 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:20.321285 345766 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.321298 345766 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc001bb1aa0 13 D0713 08:45:20.321308 345766 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:20.321389 345766 task_signals.go:470] [ 898: 898] Notified of signal 23 D0713 08:45:20.321492 345766 task_signals.go:220] [ 898: 898] Signal 23: delivering to handler D0713 08:45:20.330863 345766 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.330901 345766 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc001bb1aa0 14 D0713 08:45:20.330912 345766 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:20.330988 345766 task_exit.go:204] [ 898: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.331013 345766 task_exit.go:204] [ 898: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.331047 345766 task_signals.go:204] [ 898: 902] Signal 898, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.331055 345766 task_signals.go:204] [ 898: 900] Signal 898, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.331093 345766 task_signals.go:204] [ 898: 899] Signal 898, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.331120 345766 task_exit.go:204] [ 898: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.331174 345766 task_exit.go:204] [ 898: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.331209 345766 task_exit.go:204] [ 898: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.331252 345766 task_exit.go:204] [ 898: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.331273 345766 task_exit.go:204] [ 898: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.331278 345766 task_exit.go:204] [ 898: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.331295 345766 task_exit.go:204] [ 898: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.331310 345766 task_exit.go:204] [ 898: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.331315 345766 task_exit.go:204] [ 898: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.331245 345766 task_signals.go:204] [ 898: 901] Signal 898, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.331330 345766 task_exit.go:204] [ 898: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.332961 345766 task_exit.go:204] [ 898: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.332983 345766 task_exit.go:204] [ 898: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.332994 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.333045 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.333053 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.333193 345766 task_exit.go:204] [ 898: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.334110 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.335924 345766 syscalls.go:262] [ 903: 903] Allocating stack with size of 8388608 bytes D0713 08:45:20.336172 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.337627 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.337726 345766 usertrap_amd64.go:106] [ 903: 903] Map a usertrap vma at 64000 D0713 08:45:20.337886 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 1 D0713 08:45:20.337942 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:20.338545 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.338576 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 2 D0713 08:45:20.338592 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:20.339444 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.339479 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 3 D0713 08:45:20.339497 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:20.346732 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.346782 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 4 D0713 08:45:20.346808 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:20.348174 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.348184 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 5 D0713 08:45:20.348204 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:20.348259 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.348273 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 6 D0713 08:45:20.348283 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:20.348711 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.348728 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 7 D0713 08:45:20.348734 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:20.348882 345766 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.348898 345766 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc00150f7d0 8 D0713 08:45:20.348905 345766 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:20.349221 345766 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.349239 345766 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc00150f7d0 9 D0713 08:45:20.349246 345766 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:20.349264 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.349270 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 10 D0713 08:45:20.349276 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:20.349825 345766 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.349851 345766 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc00150f7d0 11 D0713 08:45:20.349865 345766 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:20.349921 345766 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.349941 345766 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc00150f7d0 12 D0713 08:45:20.349954 345766 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:20.349977 345766 task_signals.go:470] [ 903: 903] Notified of signal 23 D0713 08:45:20.350003 345766 task_signals.go:220] [ 903: 903] Signal 23: delivering to handler D0713 08:45:20.358413 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.358462 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 13 D0713 08:45:20.358473 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:20.363193 345766 task_signals.go:470] [ 903: 903] Notified of signal 23 D0713 08:45:20.363297 345766 task_signals.go:220] [ 903: 903] Signal 23: delivering to handler D0713 08:45:20.370931 345766 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.370968 345766 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc00150f7d0 14 D0713 08:45:20.370979 345766 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:20.371049 345766 task_exit.go:204] [ 903: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.371074 345766 task_exit.go:204] [ 903: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.371098 345766 task_signals.go:204] [ 903: 907] Signal 903, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.371098 345766 task_signals.go:204] [ 903: 905] Signal 903, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.371113 345766 task_exit.go:204] [ 903: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.371169 345766 task_exit.go:204] [ 903: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.371174 345766 task_exit.go:204] [ 903: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.371187 345766 task_exit.go:204] [ 903: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.371239 345766 task_exit.go:204] [ 903: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.371248 345766 task_exit.go:204] [ 903: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.371269 345766 task_signals.go:204] [ 903: 906] Signal 903, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.371281 345766 task_exit.go:204] [ 903: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.371292 345766 task_exit.go:204] [ 903: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.371298 345766 task_exit.go:204] [ 903: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.371312 345766 task_signals.go:204] [ 903: 904] Signal 903, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.371333 345766 task_exit.go:204] [ 903: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.372882 345766 task_exit.go:204] [ 903: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.372910 345766 task_exit.go:204] [ 903: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.372921 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.372975 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.372987 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.373085 345766 task_exit.go:204] [ 903: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.373773 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.375175 345766 syscalls.go:262] [ 908: 908] Allocating stack with size of 8388608 bytes D0713 08:45:20.375326 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.376780 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.376816 345766 usertrap_amd64.go:106] [ 908: 908] Map a usertrap vma at 6a000 D0713 08:45:20.376904 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 1 D0713 08:45:20.376935 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:20.377376 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.377398 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 2 D0713 08:45:20.377405 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:20.378130 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.378157 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 3 D0713 08:45:20.378165 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:20.385496 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.385528 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 4 D0713 08:45:20.385539 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:20.386679 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.386695 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 5 D0713 08:45:20.386705 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:20.386767 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.386785 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 6 D0713 08:45:20.386791 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:20.386993 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.387011 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 7 D0713 08:45:20.387017 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:20.387197 345766 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.387239 345766 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc001472000 8 D0713 08:45:20.387260 345766 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:20.387579 345766 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.387615 345766 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc001472000 9 D0713 08:45:20.387629 345766 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:20.387752 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.387783 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 10 D0713 08:45:20.387796 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:20.394734 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.394765 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 11 D0713 08:45:20.394776 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:20.398731 345766 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.398808 345766 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc001472000 12 D0713 08:45:20.398835 345766 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:20.398877 345766 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.398894 345766 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc001472000 13 D0713 08:45:20.398904 345766 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:20.398991 345766 task_signals.go:470] [ 908: 908] Notified of signal 23 D0713 08:45:20.399083 345766 task_signals.go:220] [ 908: 908] Signal 23: delivering to handler D0713 08:45:20.405625 345766 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.405657 345766 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc001472000 14 D0713 08:45:20.405668 345766 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:20.405724 345766 task_exit.go:204] [ 908: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.405744 345766 task_exit.go:204] [ 908: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.405765 345766 task_signals.go:204] [ 908: 911] Signal 908, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.405786 345766 task_signals.go:204] [ 908: 909] Signal 908, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.405791 345766 task_exit.go:204] [ 908: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.405765 345766 task_signals.go:204] [ 908: 910] Signal 908, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.405790 345766 task_signals.go:204] [ 908: 912] Signal 908, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.405806 345766 task_exit.go:204] [ 908: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.405813 345766 task_exit.go:204] [ 908: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.405826 345766 task_exit.go:204] [ 908: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.405832 345766 task_exit.go:204] [ 908: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.405835 345766 task_exit.go:204] [ 908: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.405841 345766 task_exit.go:204] [ 908: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.405851 345766 task_exit.go:204] [ 908: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.405867 345766 task_exit.go:204] [ 908: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.405875 345766 task_exit.go:204] [ 908: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.407070 345766 task_exit.go:204] [ 908: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.407091 345766 task_exit.go:204] [ 908: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.407102 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.407146 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.407162 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.407281 345766 task_exit.go:204] [ 908: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.407803 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.409676 345766 syscalls.go:262] [ 913: 913] Allocating stack with size of 8388608 bytes D0713 08:45:20.409795 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.411029 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.411060 345766 usertrap_amd64.go:106] [ 913: 913] Map a usertrap vma at 64000 D0713 08:45:20.411127 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 1 D0713 08:45:20.411143 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:20.411365 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.411378 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 2 D0713 08:45:20.411384 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:20.411982 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.412008 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 3 D0713 08:45:20.412020 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:20.417809 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.417837 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 4 D0713 08:45:20.417848 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:20.418964 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.418989 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 5 D0713 08:45:20.419000 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:20.419039 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.419044 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 6 D0713 08:45:20.419049 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:20.419192 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.419204 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 7 D0713 08:45:20.419210 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:20.419331 345766 usertrap_amd64.go:212] [ 913: 914] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.419360 345766 usertrap_amd64.go:122] [ 913: 914] Allocate a new trap: 0xc000850c60 8 D0713 08:45:20.419373 345766 usertrap_amd64.go:225] [ 913: 914] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:20.419585 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.419618 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 9 D0713 08:45:20.419629 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:20.419642 345766 usertrap_amd64.go:212] [ 913: 914] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.419649 345766 usertrap_amd64.go:122] [ 913: 914] Allocate a new trap: 0xc000850c60 10 D0713 08:45:20.419657 345766 usertrap_amd64.go:225] [ 913: 914] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:20.420175 345766 usertrap_amd64.go:212] [ 913: 914] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.420213 345766 usertrap_amd64.go:122] [ 913: 914] Allocate a new trap: 0xc000850c60 11 D0713 08:45:20.420224 345766 usertrap_amd64.go:225] [ 913: 914] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:20.420284 345766 usertrap_amd64.go:212] [ 913: 914] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.420306 345766 usertrap_amd64.go:122] [ 913: 914] Allocate a new trap: 0xc000850c60 12 D0713 08:45:20.420382 345766 usertrap_amd64.go:225] [ 913: 914] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:20.420429 345766 task_signals.go:470] [ 913: 913] Notified of signal 23 D0713 08:45:20.420460 345766 task_signals.go:220] [ 913: 913] Signal 23: delivering to handler D0713 08:45:20.426323 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.426348 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 13 D0713 08:45:20.426355 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:20.430798 345766 task_signals.go:470] [ 913: 913] Notified of signal 23 D0713 08:45:20.432854 345766 task_signals.go:220] [ 913: 913] Signal 23: delivering to handler D0713 08:45:20.437000 345766 usertrap_amd64.go:212] [ 913: 913] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.437056 345766 usertrap_amd64.go:122] [ 913: 913] Allocate a new trap: 0xc000850c60 14 D0713 08:45:20.437072 345766 usertrap_amd64.go:225] [ 913: 913] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:20.437144 345766 task_exit.go:204] [ 913: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.437177 345766 task_exit.go:204] [ 913: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.437179 345766 task_signals.go:204] [ 913: 915] Signal 913, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.437207 345766 task_signals.go:204] [ 913: 916] Signal 913, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.437225 345766 task_exit.go:204] [ 913: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.437236 345766 task_signals.go:204] [ 913: 914] Signal 913, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.437258 345766 task_signals.go:204] [ 913: 917] Signal 913, PID: 917, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.437267 345766 task_exit.go:204] [ 913: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.437275 345766 task_exit.go:204] [ 913: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.437298 345766 task_exit.go:204] [ 913: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.437339 345766 task_exit.go:204] [ 913: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.437355 345766 task_exit.go:204] [ 913: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.437369 345766 task_exit.go:204] [ 913: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.437376 345766 task_exit.go:204] [ 913: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.437384 345766 task_exit.go:204] [ 913: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.437393 345766 task_exit.go:204] [ 913: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.438655 345766 task_exit.go:204] [ 913: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.438677 345766 task_exit.go:204] [ 913: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.438693 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.438717 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.438724 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.438913 345766 task_exit.go:204] [ 913: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.439783 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.441403 345766 syscalls.go:262] [ 918: 918] Allocating stack with size of 8388608 bytes D0713 08:45:20.441557 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.442763 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.442802 345766 usertrap_amd64.go:106] [ 918: 918] Map a usertrap vma at 63000 D0713 08:45:20.442980 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 1 D0713 08:45:20.443036 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:20.443390 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.443413 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 2 D0713 08:45:20.443423 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:20.444066 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.444087 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 3 D0713 08:45:20.444095 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:20.448837 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.448867 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 4 D0713 08:45:20.448883 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:20.449884 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.449911 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 5 D0713 08:45:20.449925 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:20.449987 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.450003 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 6 D0713 08:45:20.450008 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:20.450238 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.450261 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 7 D0713 08:45:20.450268 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:20.450424 345766 usertrap_amd64.go:212] [ 918: 919] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.450441 345766 usertrap_amd64.go:122] [ 918: 919] Allocate a new trap: 0xc000850fc0 8 D0713 08:45:20.450447 345766 usertrap_amd64.go:225] [ 918: 919] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:20.450685 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.450710 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 9 D0713 08:45:20.450721 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:20.450735 345766 usertrap_amd64.go:212] [ 918: 919] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.450742 345766 usertrap_amd64.go:122] [ 918: 919] Allocate a new trap: 0xc000850fc0 10 D0713 08:45:20.450750 345766 usertrap_amd64.go:225] [ 918: 919] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:20.451238 345766 usertrap_amd64.go:212] [ 918: 919] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.451263 345766 usertrap_amd64.go:122] [ 918: 919] Allocate a new trap: 0xc000850fc0 11 D0713 08:45:20.451273 345766 usertrap_amd64.go:225] [ 918: 919] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:20.451301 345766 usertrap_amd64.go:212] [ 918: 919] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.451306 345766 usertrap_amd64.go:122] [ 918: 919] Allocate a new trap: 0xc000850fc0 12 D0713 08:45:20.451312 345766 usertrap_amd64.go:225] [ 918: 919] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:20.451324 345766 task_signals.go:470] [ 918: 918] Notified of signal 23 D0713 08:45:20.451392 345766 task_signals.go:220] [ 918: 918] Signal 23: delivering to handler D0713 08:45:20.458313 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.458343 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 13 D0713 08:45:20.458353 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:20.462044 345766 task_signals.go:470] [ 918: 918] Notified of signal 23 D0713 08:45:20.462095 345766 task_signals.go:220] [ 918: 918] Signal 23: delivering to handler D0713 08:45:20.468413 345766 usertrap_amd64.go:212] [ 918: 918] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.468443 345766 usertrap_amd64.go:122] [ 918: 918] Allocate a new trap: 0xc000850fc0 14 D0713 08:45:20.468453 345766 usertrap_amd64.go:225] [ 918: 918] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:20.468535 345766 task_exit.go:204] [ 918: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.468644 345766 task_exit.go:204] [ 918: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.468644 345766 task_signals.go:204] [ 918: 922] Signal 918, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.468709 345766 task_exit.go:204] [ 918: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.468690 345766 task_signals.go:204] [ 918: 920] Signal 918, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.468730 345766 task_exit.go:204] [ 918: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.468767 345766 task_exit.go:204] [ 918: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.468835 345766 task_signals.go:204] [ 918: 919] Signal 918, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.468839 345766 task_signals.go:204] [ 918: 921] Signal 918, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.468847 345766 task_exit.go:204] [ 918: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.468876 345766 task_exit.go:204] [ 918: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.468886 345766 task_exit.go:204] [ 918: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.468902 345766 task_exit.go:204] [ 918: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.468971 345766 task_exit.go:204] [ 918: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.468984 345766 task_exit.go:204] [ 918: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.469025 345766 task_exit.go:204] [ 918: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.470257 345766 task_exit.go:204] [ 918: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.470297 345766 task_exit.go:204] [ 918: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.470323 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.470358 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.470379 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.470542 345766 task_exit.go:204] [ 918: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.471686 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.473744 345766 syscalls.go:262] [ 923: 923] Allocating stack with size of 8388608 bytes D0713 08:45:20.473888 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.475542 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.475643 345766 usertrap_amd64.go:106] [ 923: 923] Map a usertrap vma at 63000 D0713 08:45:20.475852 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 1 D0713 08:45:20.475906 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:20.476491 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.476530 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 2 D0713 08:45:20.476545 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:20.477406 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.477431 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 3 D0713 08:45:20.477440 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:20.484472 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.484517 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 4 D0713 08:45:20.484533 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:20.485835 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.485866 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 5 D0713 08:45:20.485877 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:20.485967 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.485983 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 6 D0713 08:45:20.485993 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:20.486250 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.486269 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 7 D0713 08:45:20.486276 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:20.486431 345766 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.486455 345766 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc001ab67b0 8 D0713 08:45:20.486464 345766 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:20.486675 345766 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.486712 345766 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc001ab67b0 9 D0713 08:45:20.486727 345766 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:20.486890 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.486914 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 10 D0713 08:45:20.487020 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:20.487079 345766 usertrap_amd64.go:212] [ 923: 926] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.487102 345766 usertrap_amd64.go:122] [ 923: 926] Allocate a new trap: 0xc001ab67b0 11 D0713 08:45:20.487111 345766 usertrap_amd64.go:225] [ 923: 926] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:20.494689 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.494730 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 12 D0713 08:45:20.494744 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:20.497744 345766 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.497778 345766 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc001ab67b0 13 D0713 08:45:20.497794 345766 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:20.497856 345766 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.497881 345766 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc001ab67b0 14 D0713 08:45:20.497898 345766 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:20.497941 345766 task_signals.go:470] [ 923: 923] Notified of signal 23 D0713 08:45:20.498028 345766 task_signals.go:220] [ 923: 923] Signal 23: delivering to handler D0713 08:45:20.505712 345766 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.505745 345766 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc001ab67b0 15 D0713 08:45:20.505758 345766 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 08:45:20.505869 345766 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.505920 345766 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.505942 345766 task_signals.go:204] [ 923: 924] Signal 923, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.505982 345766 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.505977 345766 task_signals.go:204] [ 923: 925] Signal 923, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.506024 345766 task_signals.go:204] [ 923: 926] Signal 923, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.506007 345766 task_signals.go:204] [ 923: 927] Signal 923, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.506042 345766 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.506048 345766 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.506062 345766 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.506070 345766 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.506075 345766 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.506086 345766 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.506143 345766 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.506154 345766 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.506175 345766 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.507919 345766 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.507948 345766 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.507963 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.508017 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.508038 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.508127 345766 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.509394 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.510955 345766 syscalls.go:262] [ 928: 928] Allocating stack with size of 8388608 bytes D0713 08:45:20.511048 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.512189 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.512272 345766 usertrap_amd64.go:106] [ 928: 928] Map a usertrap vma at 60000 D0713 08:45:20.512391 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 1 D0713 08:45:20.512430 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:20.512913 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.512957 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 2 D0713 08:45:20.512972 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:20.513691 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.513721 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 3 D0713 08:45:20.513735 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:20.522515 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.522544 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 4 D0713 08:45:20.522557 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:20.523757 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.523786 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 5 D0713 08:45:20.523797 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:20.523857 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.523868 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 6 D0713 08:45:20.523874 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:20.524286 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.524304 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 7 D0713 08:45:20.524311 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:20.524413 345766 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.524429 345766 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc0008510e0 8 D0713 08:45:20.524436 345766 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:20.524528 345766 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.524558 345766 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc0008510e0 9 D0713 08:45:20.524570 345766 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:20.524760 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.524788 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 10 D0713 08:45:20.524801 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:20.532418 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.532447 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 11 D0713 08:45:20.532460 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:20.536200 345766 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.536231 345766 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc0008510e0 12 D0713 08:45:20.536243 345766 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:20.536307 345766 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.536322 345766 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc0008510e0 13 D0713 08:45:20.536332 345766 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:20.536399 345766 task_signals.go:470] [ 928: 928] Notified of signal 23 D0713 08:45:20.536486 345766 task_signals.go:220] [ 928: 928] Signal 23: delivering to handler D0713 08:45:20.542847 345766 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.542879 345766 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc0008510e0 14 D0713 08:45:20.542892 345766 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:20.543021 345766 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.543052 345766 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.543072 345766 task_signals.go:204] [ 928: 931] Signal 928, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.543069 345766 task_signals.go:204] [ 928: 930] Signal 928, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.543089 345766 task_signals.go:204] [ 928: 932] Signal 928, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.543089 345766 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.543092 345766 task_signals.go:204] [ 928: 929] Signal 928, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.543109 345766 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.543123 345766 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.543150 345766 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.543160 345766 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.543175 345766 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.543216 345766 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.543236 345766 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.543249 345766 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.543261 345766 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.544763 345766 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.544802 345766 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.544818 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.544858 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.544893 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.545330 345766 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.546163 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.547720 345766 syscalls.go:262] [ 933: 933] Allocating stack with size of 8388608 bytes D0713 08:45:20.547917 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.549248 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.549284 345766 usertrap_amd64.go:106] [ 933: 933] Map a usertrap vma at 60000 D0713 08:45:20.549354 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 1 D0713 08:45:20.549375 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:20.549800 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.549834 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 2 D0713 08:45:20.549851 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:20.550679 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.550704 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 3 D0713 08:45:20.550715 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:20.556749 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.556776 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 4 D0713 08:45:20.556787 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:20.557879 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.557910 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 5 D0713 08:45:20.557925 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:20.558024 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.558031 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 6 D0713 08:45:20.558038 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:20.558198 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.558218 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 7 D0713 08:45:20.558225 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:20.558337 345766 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.558353 345766 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0004b02d0 8 D0713 08:45:20.558360 345766 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:20.558574 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.558603 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 9 D0713 08:45:20.558616 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:20.558649 345766 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.558676 345766 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0004b02d0 10 D0713 08:45:20.558691 345766 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:20.559059 345766 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.559086 345766 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0004b02d0 11 D0713 08:45:20.559096 345766 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:20.559153 345766 usertrap_amd64.go:212] [ 933: 934] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.559173 345766 usertrap_amd64.go:122] [ 933: 934] Allocate a new trap: 0xc0004b02d0 12 D0713 08:45:20.559183 345766 usertrap_amd64.go:225] [ 933: 934] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:20.559231 345766 task_signals.go:470] [ 933: 933] Notified of signal 23 D0713 08:45:20.559338 345766 task_signals.go:220] [ 933: 933] Signal 23: delivering to handler D0713 08:45:20.565671 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.565697 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 13 D0713 08:45:20.565710 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:20.569829 345766 task_signals.go:470] [ 933: 933] Notified of signal 23 D0713 08:45:20.569885 345766 task_signals.go:220] [ 933: 933] Signal 23: delivering to handler D0713 08:45:20.575709 345766 usertrap_amd64.go:212] [ 933: 933] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.575739 345766 usertrap_amd64.go:122] [ 933: 933] Allocate a new trap: 0xc0004b02d0 14 D0713 08:45:20.575761 345766 usertrap_amd64.go:225] [ 933: 933] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:20.575823 345766 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.575847 345766 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.575867 345766 task_signals.go:204] [ 933: 935] Signal 933, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.575894 345766 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.575896 345766 task_signals.go:204] [ 933: 937] Signal 933, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.575909 345766 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.575916 345766 task_exit.go:204] [ 933: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.575875 345766 task_signals.go:204] [ 933: 936] Signal 933, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.575938 345766 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.575948 345766 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.575965 345766 task_exit.go:204] [ 933: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.575987 345766 task_signals.go:204] [ 933: 934] Signal 933, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.575997 345766 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.576024 345766 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.576031 345766 task_exit.go:204] [ 933: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.576047 345766 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.577464 345766 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.577492 345766 task_exit.go:204] [ 933: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.577505 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.577527 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.577533 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.577650 345766 task_exit.go:204] [ 933: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.578321 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.579701 345766 syscalls.go:262] [ 938: 938] Allocating stack with size of 8388608 bytes D0713 08:45:20.579849 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.581401 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.581447 345766 usertrap_amd64.go:106] [ 938: 938] Map a usertrap vma at 63000 D0713 08:45:20.581550 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 1 D0713 08:45:20.581578 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:20.581960 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.581984 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 2 D0713 08:45:20.581993 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:20.582610 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.582636 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 3 D0713 08:45:20.582644 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:20.587658 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.587682 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 4 D0713 08:45:20.587693 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:20.588775 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.588795 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 5 D0713 08:45:20.588803 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:20.588851 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.588865 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 6 D0713 08:45:20.588872 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:20.589133 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.589153 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 7 D0713 08:45:20.589160 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:20.589279 345766 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.589300 345766 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc00077c9f0 8 D0713 08:45:20.589333 345766 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:20.589507 345766 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.589541 345766 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc00077c9f0 9 D0713 08:45:20.589555 345766 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:20.589569 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.589581 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 10 D0713 08:45:20.589626 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:20.597336 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.597560 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 11 D0713 08:45:20.597616 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:20.600748 345766 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.600783 345766 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc00077c9f0 12 D0713 08:45:20.600797 345766 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:20.600868 345766 usertrap_amd64.go:212] [ 938: 939] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.600884 345766 usertrap_amd64.go:122] [ 938: 939] Allocate a new trap: 0xc00077c9f0 13 D0713 08:45:20.600892 345766 usertrap_amd64.go:225] [ 938: 939] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:20.601013 345766 task_signals.go:470] [ 938: 938] Notified of signal 23 D0713 08:45:20.601117 345766 task_signals.go:220] [ 938: 938] Signal 23: delivering to handler I0713 08:45:20.610257 345766 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 08:45:20.610386 345766 usertrap_amd64.go:212] [ 938: 938] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.610404 345766 usertrap_amd64.go:122] [ 938: 938] Allocate a new trap: 0xc00077c9f0 14 D0713 08:45:20.610419 345766 usertrap_amd64.go:225] [ 938: 938] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:20.610506 345766 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.610540 345766 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.610560 345766 task_signals.go:204] [ 938: 939] Signal 938, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.610597 345766 task_signals.go:204] [ 938: 942] Signal 938, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.610581 345766 task_signals.go:204] [ 938: 943] Signal 938, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.610586 345766 task_signals.go:204] [ 938: 941] Signal 938, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.610622 345766 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.610653 345766 task_signals.go:204] [ 938: 940] Signal 938, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.610691 345766 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.610697 345766 task_exit.go:204] [ 938: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.610712 345766 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.610719 345766 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.610723 345766 task_exit.go:204] [ 938: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.610733 345766 task_exit.go:204] [ 938: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.610745 345766 task_exit.go:204] [ 938: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.610753 345766 task_exit.go:204] [ 938: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.610762 345766 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.610775 345766 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.610779 345766 task_exit.go:204] [ 938: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.610787 345766 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.612059 345766 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.612079 345766 task_exit.go:204] [ 938: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.612091 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.612123 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.612129 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.612249 345766 task_exit.go:204] [ 938: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.612401 345766 task_signals.go:470] [ 6: 8] Notified of signal 23 D0713 08:45:20.612475 345766 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0713 08:45:20.612816 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.614508 345766 syscalls.go:262] [ 944: 944] Allocating stack with size of 8388608 bytes D0713 08:45:20.614615 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.615732 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.615791 345766 usertrap_amd64.go:106] [ 944: 944] Map a usertrap vma at 65000 D0713 08:45:20.616031 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 1 D0713 08:45:20.616062 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:20.616693 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.616773 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 2 D0713 08:45:20.616797 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:20.617578 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.617603 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 3 D0713 08:45:20.617613 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:20.623541 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.623577 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 4 D0713 08:45:20.623588 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:20.624745 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.624773 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 5 D0713 08:45:20.624785 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:20.624890 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.624897 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 6 D0713 08:45:20.624905 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:20.625563 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.625583 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 7 D0713 08:45:20.625591 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:20.625775 345766 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.625794 345766 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc000851890 8 D0713 08:45:20.625801 345766 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:20.626065 345766 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.626084 345766 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc000851890 9 D0713 08:45:20.626094 345766 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:20.626164 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.626175 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 10 D0713 08:45:20.626187 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:20.626383 345766 usertrap_amd64.go:212] [ 944: 947] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.626439 345766 usertrap_amd64.go:122] [ 944: 947] Allocate a new trap: 0xc000851890 11 D0713 08:45:20.626471 345766 usertrap_amd64.go:225] [ 944: 947] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:20.626917 345766 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.626941 345766 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc000851890 12 D0713 08:45:20.626953 345766 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:20.627038 345766 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.627056 345766 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc000851890 13 D0713 08:45:20.627067 345766 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:20.627153 345766 task_signals.go:470] [ 944: 944] Notified of signal 23 D0713 08:45:20.627180 345766 task_signals.go:220] [ 944: 944] Signal 23: delivering to handler D0713 08:45:20.633710 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.633742 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 14 D0713 08:45:20.633753 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46af29 trap addr 65460 ([184 37 1 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:20.637421 345766 task_signals.go:470] [ 944: 944] Notified of signal 23 D0713 08:45:20.637472 345766 task_signals.go:220] [ 944: 944] Signal 23: delivering to handler D0713 08:45:20.644637 345766 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.644668 345766 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc000851890 15 D0713 08:45:20.644685 345766 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 08:45:20.644761 345766 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.644786 345766 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.644798 345766 task_signals.go:204] [ 944: 946] Signal 944, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.644829 345766 task_signals.go:204] [ 944: 948] Signal 944, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.644830 345766 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.644810 345766 task_signals.go:204] [ 944: 947] Signal 944, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.644842 345766 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.644850 345766 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.644862 345766 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.644880 345766 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.644905 345766 task_signals.go:204] [ 944: 945] Signal 944, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.644917 345766 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.644933 345766 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.644999 345766 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.645026 345766 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.645032 345766 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.646729 345766 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.646756 345766 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.646768 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.646832 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.646859 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.647049 345766 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.653629 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.654933 345766 syscalls.go:262] [ 949: 949] Allocating stack with size of 8388608 bytes D0713 08:45:20.655049 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.656004 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.656049 345766 usertrap_amd64.go:106] [ 949: 949] Map a usertrap vma at 60000 D0713 08:45:20.656124 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 1 D0713 08:45:20.656149 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:20.656439 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.656448 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 2 D0713 08:45:20.656453 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:20.656929 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.656969 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 3 D0713 08:45:20.656982 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:20.662834 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.662863 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 4 D0713 08:45:20.662873 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:20.664063 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.664086 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 5 D0713 08:45:20.664094 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:20.664172 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.664193 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 6 D0713 08:45:20.664203 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:20.664742 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.664763 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 7 D0713 08:45:20.664771 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:20.664927 345766 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.664967 345766 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc001473140 8 D0713 08:45:20.664996 345766 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:20.665075 345766 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.665083 345766 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc001473140 9 D0713 08:45:20.665090 345766 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:20.665245 345766 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.665268 345766 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc001473140 10 D0713 08:45:20.665279 345766 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b020 trap addr 60320 ([184 39 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:20.665364 345766 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.665390 345766 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc001473140 11 D0713 08:45:20.665400 345766 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b04f trap addr 60370 ([184 234 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:20.665506 345766 task_signals.go:481] [ 949: 949] No task notified of signal 23 D0713 08:45:20.665563 345766 task_signals.go:220] [ 949: 949] Signal 23: delivering to handler D0713 08:45:20.665629 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.665639 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 12 D0713 08:45:20.665646 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b57c trap addr 603c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:20.672799 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.672825 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 13 D0713 08:45:20.672834 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:20.676778 345766 task_signals.go:470] [ 949: 949] Notified of signal 23 D0713 08:45:20.676882 345766 task_signals.go:220] [ 949: 949] Signal 23: delivering to handler I0713 08:45:20.683811 345766 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 08:45:20.683914 345766 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.683926 345766 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc001473140 14 D0713 08:45:20.683938 345766 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:20.684020 345766 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.684048 345766 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.684077 345766 task_signals.go:204] [ 949: 953] Signal 949, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.684092 345766 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.684088 345766 task_signals.go:204] [ 949: 950] Signal 949, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.684106 345766 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.684107 345766 task_signals.go:204] [ 949: 952] Signal 949, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.684116 345766 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.684079 345766 task_signals.go:204] [ 949: 951] Signal 949, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.684151 345766 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.684186 345766 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.684227 345766 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.684246 345766 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.684255 345766 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.684364 345766 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.684382 345766 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.685650 345766 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.685677 345766 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.685696 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.685724 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.685733 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.685899 345766 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.686543 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.688220 345766 syscalls.go:262] [ 954: 954] Allocating stack with size of 8388608 bytes D0713 08:45:20.688376 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.690096 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.690174 345766 usertrap_amd64.go:106] [ 954: 954] Map a usertrap vma at 66000 D0713 08:45:20.690283 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 1 D0713 08:45:20.690324 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:20.690850 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.690886 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 2 D0713 08:45:20.690909 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:20.691567 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.691594 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 3 D0713 08:45:20.691615 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:20.698082 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.698113 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 4 D0713 08:45:20.698134 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:20.699329 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.699365 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 5 D0713 08:45:20.699380 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:20.699451 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.699470 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 6 D0713 08:45:20.699480 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:20.699962 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.699989 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 7 D0713 08:45:20.699996 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:20.700163 345766 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.700188 345766 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc00077cde0 8 D0713 08:45:20.700199 345766 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:20.700390 345766 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.700407 345766 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc00077cde0 9 D0713 08:45:20.700414 345766 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:20.700502 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.700521 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 10 D0713 08:45:20.700530 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:20.701318 345766 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.701344 345766 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc00077cde0 11 D0713 08:45:20.701354 345766 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:20.701482 345766 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.701559 345766 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc00077cde0 12 D0713 08:45:20.701576 345766 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:20.701605 345766 task_signals.go:470] [ 954: 954] Notified of signal 23 D0713 08:45:20.701646 345766 task_signals.go:220] [ 954: 954] Signal 23: delivering to handler D0713 08:45:20.708996 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.709029 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 13 D0713 08:45:20.709040 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:20.711752 345766 task_signals.go:470] [ 954: 954] Notified of signal 23 D0713 08:45:20.711788 345766 task_signals.go:220] [ 954: 954] Signal 23: delivering to handler I0713 08:45:20.719346 345766 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 08:45:20.719429 345766 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.719440 345766 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc00077cde0 14 D0713 08:45:20.719448 345766 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:20.719493 345766 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.719518 345766 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.719538 345766 task_signals.go:204] [ 954: 957] Signal 954, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.719533 345766 task_signals.go:204] [ 954: 956] Signal 954, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.719559 345766 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.719557 345766 task_signals.go:204] [ 954: 958] Signal 954, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.719565 345766 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.719565 345766 task_signals.go:204] [ 954: 955] Signal 954, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.719577 345766 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.719589 345766 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.719614 345766 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.719630 345766 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.719644 345766 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.719653 345766 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.719659 345766 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.719670 345766 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.721028 345766 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.721056 345766 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.721073 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.721100 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.721109 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.721253 345766 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.721405 345766 task_signals.go:470] [ 6: 8] Notified of signal 23 D0713 08:45:20.721444 345766 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0713 08:45:20.721854 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.723311 345766 syscalls.go:262] [ 959: 959] Allocating stack with size of 8388608 bytes D0713 08:45:20.723429 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.724527 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.724570 345766 usertrap_amd64.go:106] [ 959: 959] Map a usertrap vma at 60000 D0713 08:45:20.724660 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 1 D0713 08:45:20.724695 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:20.725219 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.725245 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 2 D0713 08:45:20.725256 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:20.726331 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.726359 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 3 D0713 08:45:20.726368 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:20.732351 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.732376 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 4 D0713 08:45:20.732386 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:20.733471 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.733494 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 5 D0713 08:45:20.733507 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:20.733578 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.733595 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 6 D0713 08:45:20.733603 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:20.734045 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.734064 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 7 D0713 08:45:20.734070 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:20.734242 345766 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.734272 345766 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc0013ae330 8 D0713 08:45:20.734285 345766 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:20.734480 345766 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.734509 345766 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc0013ae330 9 D0713 08:45:20.734523 345766 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:20.734561 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.734585 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 10 D0713 08:45:20.734602 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:20.735165 345766 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.735188 345766 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc0013ae330 11 D0713 08:45:20.735196 345766 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:20.735249 345766 usertrap_amd64.go:212] [ 959: 960] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.735255 345766 usertrap_amd64.go:122] [ 959: 960] Allocate a new trap: 0xc0013ae330 12 D0713 08:45:20.735260 345766 usertrap_amd64.go:225] [ 959: 960] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:20.735277 345766 task_signals.go:470] [ 959: 959] Notified of signal 23 D0713 08:45:20.735293 345766 task_signals.go:220] [ 959: 959] Signal 23: delivering to handler D0713 08:45:20.742965 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.742988 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 13 D0713 08:45:20.742997 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:20.745453 345766 task_signals.go:470] [ 959: 959] Notified of signal 23 D0713 08:45:20.745506 345766 task_signals.go:179] [ 959: 959] Restarting syscall 202: interrupted by signal 23 D0713 08:45:20.745516 345766 task_signals.go:220] [ 959: 959] Signal 23: delivering to handler I0713 08:45:20.753868 345766 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 08:45:20.753955 345766 usertrap_amd64.go:212] [ 959: 959] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.753968 345766 usertrap_amd64.go:122] [ 959: 959] Allocate a new trap: 0xc0013ae330 14 D0713 08:45:20.753980 345766 usertrap_amd64.go:225] [ 959: 959] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:20.754060 345766 task_exit.go:204] [ 959: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.754083 345766 task_exit.go:204] [ 959: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.754096 345766 task_signals.go:204] [ 959: 961] Signal 959, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.754119 345766 task_exit.go:204] [ 959: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.754139 345766 task_exit.go:204] [ 959: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.754149 345766 task_exit.go:204] [ 959: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.754105 345766 task_signals.go:204] [ 959: 962] Signal 959, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.754192 345766 task_signals.go:204] [ 959: 960] Signal 959, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.754186 345766 task_signals.go:204] [ 959: 963] Signal 959, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.754196 345766 task_exit.go:204] [ 959: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.754281 345766 task_exit.go:204] [ 959: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.754295 345766 task_exit.go:204] [ 959: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.754315 345766 task_exit.go:204] [ 959: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.754341 345766 task_exit.go:204] [ 959: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.754348 345766 task_exit.go:204] [ 959: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.754408 345766 task_exit.go:204] [ 959: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.755773 345766 task_exit.go:204] [ 959: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.755804 345766 task_exit.go:204] [ 959: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.755819 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.755869 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.755898 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.755999 345766 task_exit.go:204] [ 959: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.756662 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.758217 345766 syscalls.go:262] [ 964: 964] Allocating stack with size of 8388608 bytes D0713 08:45:20.758339 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.759336 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.759386 345766 usertrap_amd64.go:106] [ 964: 964] Map a usertrap vma at 6a000 D0713 08:45:20.759495 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 1 D0713 08:45:20.759523 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:20.759825 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.759845 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 2 D0713 08:45:20.759854 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:20.760377 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.760426 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 3 D0713 08:45:20.760439 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:20.767435 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.767459 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 4 D0713 08:45:20.767468 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:20.768737 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.768757 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 5 D0713 08:45:20.768763 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:20.768778 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.768782 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 6 D0713 08:45:20.768787 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:20.769150 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.769170 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 7 D0713 08:45:20.769177 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:20.769298 345766 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.769323 345766 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc000418d50 8 D0713 08:45:20.769334 345766 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:20.769613 345766 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.769636 345766 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc000418d50 9 D0713 08:45:20.769645 345766 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:20.769802 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.769828 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 10 D0713 08:45:20.769838 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:20.770317 345766 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.770335 345766 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc000418d50 11 D0713 08:45:20.770346 345766 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:20.770408 345766 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.770435 345766 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc000418d50 12 D0713 08:45:20.770446 345766 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:20.770464 345766 task_signals.go:470] [ 964: 964] Notified of signal 23 D0713 08:45:20.770547 345766 task_signals.go:220] [ 964: 964] Signal 23: delivering to handler D0713 08:45:20.777155 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.777186 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 13 D0713 08:45:20.777202 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:20.781628 345766 task_signals.go:470] [ 964: 964] Notified of signal 23 D0713 08:45:20.781728 345766 task_signals.go:220] [ 964: 964] Signal 23: delivering to handler D0713 08:45:20.781940 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.781962 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 14 D0713 08:45:20.781976 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b6e0 trap addr 6a460 ([184 24 0 0 0 15 5] -> [255 36 37 96 164 6 0]) I0713 08:45:20.788459 345766 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 08:45:20.788634 345766 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.788672 345766 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc000418d50 15 D0713 08:45:20.788688 345766 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 08:45:20.788757 345766 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.788783 345766 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.788813 345766 task_signals.go:204] [ 964: 967] Signal 964, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.788806 345766 task_signals.go:204] [ 964: 966] Signal 964, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.788825 345766 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.788837 345766 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.788883 345766 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.788889 345766 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.788906 345766 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.788905 345766 task_signals.go:204] [ 964: 969] Signal 964, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.788917 345766 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.788972 345766 task_exit.go:204] [ 964: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.789020 345766 task_signals.go:204] [ 964: 968] Signal 964, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.789039 345766 task_exit.go:204] [ 964: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.789046 345766 task_exit.go:204] [ 964: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.789056 345766 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.789066 345766 task_signals.go:204] [ 964: 965] Signal 964, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.789074 345766 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.789080 345766 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.789088 345766 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.790293 345766 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.790318 345766 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.790330 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.790363 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:20.790380 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.790547 345766 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.790622 345766 task_signals.go:470] [ 6: 19] Notified of signal 23 D0713 08:45:20.790754 345766 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0713 08:45:20.791200 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.792755 345766 syscalls.go:262] [ 970: 970] Allocating stack with size of 8388608 bytes D0713 08:45:20.792852 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.793845 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.793877 345766 usertrap_amd64.go:106] [ 970: 970] Map a usertrap vma at 63000 D0713 08:45:20.793961 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 1 D0713 08:45:20.793981 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:20.794330 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.794349 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 2 D0713 08:45:20.794362 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:20.795113 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.795138 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 3 D0713 08:45:20.795148 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:20.796622 345766 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0713 08:45:20.800785 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.800816 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 4 D0713 08:45:20.800829 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:20.801847 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.801896 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 5 D0713 08:45:20.801914 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:20.801990 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.802007 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 6 D0713 08:45:20.802020 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:20.802621 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.802651 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 7 D0713 08:45:20.802665 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:20.802835 345766 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.802852 345766 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc0004190b0 8 D0713 08:45:20.802859 345766 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:20.802994 345766 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.803012 345766 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc0004190b0 9 D0713 08:45:20.803026 345766 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:20.803138 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.803161 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 10 D0713 08:45:20.803173 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:20.810700 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.810720 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 11 D0713 08:45:20.810729 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:20.814213 345766 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.814241 345766 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc0004190b0 12 D0713 08:45:20.814252 345766 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:20.814325 345766 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.814356 345766 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc0004190b0 13 D0713 08:45:20.814367 345766 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:20.814425 345766 task_signals.go:470] [ 970: 970] Notified of signal 23 D0713 08:45:20.814517 345766 task_signals.go:220] [ 970: 970] Signal 23: delivering to handler I0713 08:45:20.820363 345766 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 08:45:20.820451 345766 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.820461 345766 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc0004190b0 14 D0713 08:45:20.820469 345766 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:20.820497 345766 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.820522 345766 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.820543 345766 task_signals.go:204] [ 970: 973] Signal 970, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.820538 345766 task_signals.go:204] [ 970: 972] Signal 970, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.820552 345766 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.820569 345766 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.820582 345766 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.820597 345766 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.820607 345766 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.820613 345766 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.820624 345766 task_signals.go:204] [ 970: 974] Signal 970, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.820639 345766 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.820646 345766 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.820652 345766 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.820665 345766 task_signals.go:204] [ 970: 971] Signal 970, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.820684 345766 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.821852 345766 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.821879 345766 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.821899 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.821934 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.822035 345766 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.822554 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.823700 345766 syscalls.go:262] [ 975: 975] Allocating stack with size of 8388608 bytes D0713 08:45:20.823790 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.825167 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.825204 345766 usertrap_amd64.go:106] [ 975: 975] Map a usertrap vma at 64000 D0713 08:45:20.825315 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 1 D0713 08:45:20.825340 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:20.825740 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.825762 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 2 D0713 08:45:20.825774 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:20.826481 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.826505 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 3 D0713 08:45:20.826520 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:20.832142 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.832163 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 4 D0713 08:45:20.832173 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:20.833301 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.833312 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 5 D0713 08:45:20.833321 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:20.833337 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.833344 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 6 D0713 08:45:20.833351 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:20.833730 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.833756 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 7 D0713 08:45:20.833768 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:20.833947 345766 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.833974 345766 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc0025fa000 8 D0713 08:45:20.833987 345766 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:20.834121 345766 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.834147 345766 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc0025fa000 9 D0713 08:45:20.834158 345766 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:20.834185 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.834202 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 10 D0713 08:45:20.834283 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:20.834404 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.834434 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 11 D0713 08:45:20.834444 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:20.834842 345766 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.834860 345766 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc0025fa000 12 D0713 08:45:20.834868 345766 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:20.834930 345766 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.834954 345766 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc0025fa000 13 D0713 08:45:20.834973 345766 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:20.835022 345766 task_signals.go:470] [ 975: 975] Notified of signal 23 D0713 08:45:20.835061 345766 task_signals.go:220] [ 975: 975] Signal 23: delivering to handler D0713 08:45:20.841626 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.841687 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 14 D0713 08:45:20.841707 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46af29 trap addr 64460 ([184 37 1 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:20.845186 345766 task_signals.go:470] [ 975: 975] Notified of signal 23 D0713 08:45:20.845261 345766 task_signals.go:220] [ 975: 975] Signal 23: delivering to handler I0713 08:45:20.852449 345766 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 08:45:20.852620 345766 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.852647 345766 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc0025fa000 15 D0713 08:45:20.852669 345766 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 08:45:20.852742 345766 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.852771 345766 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.852791 345766 task_signals.go:204] [ 975: 977] Signal 975, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.852813 345766 task_signals.go:204] [ 975: 979] Signal 975, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.852824 345766 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.852852 345766 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.852858 345766 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.852797 345766 task_signals.go:204] [ 975: 978] Signal 975, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.852881 345766 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.852887 345766 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.852898 345766 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.852927 345766 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.852993 345766 task_signals.go:204] [ 975: 976] Signal 975, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.853034 345766 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.853053 345766 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.853068 345766 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.854870 345766 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.854908 345766 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.854921 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.854951 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:20.854960 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.855094 345766 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.856176 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.857814 345766 syscalls.go:262] [ 980: 980] Allocating stack with size of 8388608 bytes D0713 08:45:20.858019 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.859177 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.859219 345766 usertrap_amd64.go:106] [ 980: 980] Map a usertrap vma at 68000 D0713 08:45:20.859426 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 1 D0713 08:45:20.859460 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:20.859860 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.859879 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 2 D0713 08:45:20.859888 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:20.860420 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.860436 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 3 D0713 08:45:20.860442 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:20.865807 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.865832 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 4 D0713 08:45:20.865842 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:20.867020 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.867048 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 5 D0713 08:45:20.867059 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:20.867149 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.867167 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 6 D0713 08:45:20.867177 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:20.867905 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.867935 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 7 D0713 08:45:20.867945 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:20.868374 345766 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.868408 345766 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc0004b1050 8 D0713 08:45:20.868420 345766 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:20.868612 345766 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.868647 345766 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc0004b1050 9 D0713 08:45:20.868688 345766 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:20.868728 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.868759 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 10 D0713 08:45:20.868769 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:20.877403 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.877450 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 11 D0713 08:45:20.877462 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:20.880158 345766 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.880199 345766 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc0004b1050 12 D0713 08:45:20.880216 345766 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:20.880287 345766 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.880297 345766 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc0004b1050 13 D0713 08:45:20.880304 345766 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:20.880323 345766 task_signals.go:470] [ 980: 980] Notified of signal 23 D0713 08:45:20.880407 345766 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler D0713 08:45:20.888188 345766 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.888235 345766 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0004b1050 14 D0713 08:45:20.888250 345766 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:20.888320 345766 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.888366 345766 task_signals.go:204] [ 980: 982] Signal 980, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.888367 345766 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.888434 345766 task_signals.go:204] [ 980: 983] Signal 980, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.888465 345766 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.888456 345766 task_signals.go:204] [ 980: 984] Signal 980, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.888507 345766 task_signals.go:204] [ 980: 981] Signal 980, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.888524 345766 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.888534 345766 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.888546 345766 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.888563 345766 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.888567 345766 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.888577 345766 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.888584 345766 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.888589 345766 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.888606 345766 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.890080 345766 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.890106 345766 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.890117 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.890152 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:20.890166 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.890297 345766 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.890798 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.892419 345766 syscalls.go:262] [ 985: 985] Allocating stack with size of 8388608 bytes D0713 08:45:20.892542 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.894103 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.894161 345766 usertrap_amd64.go:106] [ 985: 985] Map a usertrap vma at 67000 D0713 08:45:20.894277 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 1 D0713 08:45:20.894315 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:20.894833 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.894850 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 2 D0713 08:45:20.894860 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:20.895656 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.895682 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 3 D0713 08:45:20.895694 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:20.901435 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.901466 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 4 D0713 08:45:20.901482 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:20.902757 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.902767 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 5 D0713 08:45:20.902775 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:20.902794 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.902799 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 6 D0713 08:45:20.902804 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:20.903181 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.903199 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 7 D0713 08:45:20.903205 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:20.903334 345766 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.903352 345766 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0026b2060 8 D0713 08:45:20.903366 345766 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:20.903598 345766 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.903624 345766 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0026b2060 9 D0713 08:45:20.903637 345766 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:20.903803 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.903828 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 10 D0713 08:45:20.903842 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:20.912717 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.912744 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 11 D0713 08:45:20.912777 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:20.915270 345766 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.915296 345766 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0026b2060 12 D0713 08:45:20.915306 345766 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:20.915377 345766 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.915390 345766 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0026b2060 13 D0713 08:45:20.915399 345766 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:20.915467 345766 task_signals.go:470] [ 985: 985] Notified of signal 23 D0713 08:45:20.915544 345766 task_signals.go:220] [ 985: 985] Signal 23: delivering to handler D0713 08:45:20.924197 345766 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.924224 345766 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0026b2060 14 D0713 08:45:20.924251 345766 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:20.924354 345766 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.924390 345766 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.924447 345766 task_signals.go:204] [ 985: 987] Signal 985, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.924467 345766 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.924473 345766 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.924479 345766 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.924492 345766 task_signals.go:204] [ 985: 988] Signal 985, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.924506 345766 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.924511 345766 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.924516 345766 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.924503 345766 task_signals.go:204] [ 985: 989] Signal 985, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.924549 345766 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.924583 345766 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.924593 345766 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.924468 345766 task_signals.go:204] [ 985: 986] Signal 985, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.924611 345766 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.926027 345766 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.926057 345766 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.926071 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.926109 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.926142 345766 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.926626 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.927861 345766 syscalls.go:262] [ 990: 990] Allocating stack with size of 8388608 bytes D0713 08:45:20.927984 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.929384 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.929432 345766 usertrap_amd64.go:106] [ 990: 990] Map a usertrap vma at 69000 D0713 08:45:20.929529 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 1 D0713 08:45:20.929558 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:20.930059 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.930082 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 2 D0713 08:45:20.930091 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:20.930963 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.931027 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 3 D0713 08:45:20.931043 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:20.937485 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.937537 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 4 D0713 08:45:20.937551 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:20.938734 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.938758 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 5 D0713 08:45:20.938767 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:20.938818 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.938823 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 6 D0713 08:45:20.938829 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:20.939422 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.939456 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 7 D0713 08:45:20.939475 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:20.939735 345766 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.939771 345766 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc00077df20 8 D0713 08:45:20.939788 345766 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:20.940021 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.940048 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 9 D0713 08:45:20.940063 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:20.940103 345766 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.940133 345766 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc00077df20 10 D0713 08:45:20.940143 345766 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:20.940314 345766 usertrap_amd64.go:212] [ 990: 993] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:20.940331 345766 usertrap_amd64.go:122] [ 990: 993] Allocate a new trap: 0xc00077df20 11 D0713 08:45:20.940337 345766 usertrap_amd64.go:225] [ 990: 993] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:20.940734 345766 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.940766 345766 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc00077df20 12 D0713 08:45:20.940777 345766 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:20.940848 345766 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.940858 345766 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc00077df20 13 D0713 08:45:20.940867 345766 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:20.940924 345766 task_signals.go:470] [ 990: 990] Notified of signal 23 D0713 08:45:20.941039 345766 task_signals.go:220] [ 990: 990] Signal 23: delivering to handler D0713 08:45:20.947557 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.947579 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 14 D0713 08:45:20.947588 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46af29 trap addr 69460 ([184 37 1 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:20.952113 345766 task_signals.go:470] [ 990: 990] Notified of signal 23 D0713 08:45:20.952207 345766 task_signals.go:220] [ 990: 990] Signal 23: delivering to handler D0713 08:45:20.958608 345766 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.958658 345766 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc00077df20 15 D0713 08:45:20.958673 345766 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 08:45:20.958738 345766 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.958758 345766 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.958784 345766 task_signals.go:204] [ 990: 993] Signal 990, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.958802 345766 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.958807 345766 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.958812 345766 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.958828 345766 task_signals.go:204] [ 990: 991] Signal 990, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.958804 345766 task_signals.go:204] [ 990: 992] Signal 990, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.958830 345766 task_signals.go:204] [ 990: 995] Signal 990, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.958864 345766 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.958904 345766 task_signals.go:204] [ 990: 994] Signal 990, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.958933 345766 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.958953 345766 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.958999 345766 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.959170 345766 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.959192 345766 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.959231 345766 task_exit.go:204] [ 990: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.959301 345766 task_exit.go:204] [ 990: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.959317 345766 task_exit.go:204] [ 990: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.959330 345766 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.961134 345766 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.961156 345766 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.961172 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.961213 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:20.961225 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.961423 345766 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitZombie to TaskExitDead I0713 08:45:20.961552 345766 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 08:45:20.962307 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.964075 345766 syscalls.go:262] [ 996: 996] Allocating stack with size of 8388608 bytes D0713 08:45:20.964265 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:20.965459 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:20.965497 345766 usertrap_amd64.go:106] [ 996: 996] Map a usertrap vma at 67000 D0713 08:45:20.965619 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 1 D0713 08:45:20.965690 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:20.966297 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:20.966326 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 2 D0713 08:45:20.966341 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:20.967454 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:20.967485 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 3 D0713 08:45:20.967498 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:20.974599 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:20.974628 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 4 D0713 08:45:20.974639 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:20.975777 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:20.975800 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 5 D0713 08:45:20.975807 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:20.975858 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46b214:sysno 13 D0713 08:45:20.975873 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 6 D0713 08:45:20.975878 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:20.976209 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:20.976225 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 7 D0713 08:45:20.976236 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:20.976352 345766 usertrap_amd64.go:212] [ 996: 997] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:20.976380 345766 usertrap_amd64.go:122] [ 996: 997] Allocate a new trap: 0xc0013aec30 8 D0713 08:45:20.976418 345766 usertrap_amd64.go:225] [ 996: 997] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:20.976565 345766 usertrap_amd64.go:212] [ 996: 997] Found the pattern at ip 46af76:sysno 35 D0713 08:45:20.976589 345766 usertrap_amd64.go:122] [ 996: 997] Allocate a new trap: 0xc0013aec30 9 D0713 08:45:20.976598 345766 usertrap_amd64.go:225] [ 996: 997] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:20.976610 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:20.976617 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 10 D0713 08:45:20.976625 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:20.977257 345766 usertrap_amd64.go:212] [ 996: 997] Found the pattern at ip 46b020:sysno 39 D0713 08:45:20.977283 345766 usertrap_amd64.go:122] [ 996: 997] Allocate a new trap: 0xc0013aec30 11 D0713 08:45:20.977293 345766 usertrap_amd64.go:225] [ 996: 997] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:20.977392 345766 usertrap_amd64.go:212] [ 996: 997] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:20.977423 345766 usertrap_amd64.go:122] [ 996: 997] Allocate a new trap: 0xc0013aec30 12 D0713 08:45:20.977432 345766 usertrap_amd64.go:225] [ 996: 997] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:20.977492 345766 task_signals.go:470] [ 996: 996] Notified of signal 23 D0713 08:45:20.977560 345766 task_signals.go:220] [ 996: 996] Signal 23: delivering to handler D0713 08:45:20.983907 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46af29:sysno 293 D0713 08:45:20.983934 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 13 D0713 08:45:20.983942 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:20.987752 345766 task_signals.go:470] [ 996: 996] Notified of signal 23 D0713 08:45:20.987799 345766 task_signals.go:220] [ 996: 996] Signal 23: delivering to handler I0713 08:45:20.994160 345766 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 08:45:20.994289 345766 usertrap_amd64.go:212] [ 996: 996] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:20.994366 345766 usertrap_amd64.go:122] [ 996: 996] Allocate a new trap: 0xc0013aec30 14 D0713 08:45:20.994386 345766 usertrap_amd64.go:225] [ 996: 996] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:20.994459 345766 task_exit.go:204] [ 996: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.994503 345766 task_exit.go:204] [ 996: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.994550 345766 task_signals.go:204] [ 996: 1000] Signal 996, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.994559 345766 task_signals.go:204] [ 996: 998] Signal 996, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.994573 345766 task_signals.go:204] [ 996: 997] Signal 996, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.994586 345766 task_exit.go:204] [ 996: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.994609 345766 task_signals.go:204] [ 996: 999] Signal 996, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:20.994621 345766 task_exit.go:204] [ 996: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.994635 345766 task_exit.go:204] [ 996: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.994652 345766 task_exit.go:204] [ 996: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.994671 345766 task_exit.go:204] [ 996: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.994677 345766 task_exit.go:204] [ 996: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.994690 345766 task_exit.go:204] [ 996: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.994707 345766 task_exit.go:204] [ 996: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.994712 345766 task_exit.go:204] [ 996: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.994724 345766 task_exit.go:204] [ 996: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:20.996123 345766 task_exit.go:204] [ 996: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:20.996156 345766 task_exit.go:204] [ 996: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.996177 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:20.996217 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:20.996227 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:20.996345 345766 task_exit.go:204] [ 996: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:20.996650 345766 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 08:45:20.996696 345766 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 08:45:21.000526 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.002834 345766 syscalls.go:262] [ 1001: 1001] Allocating stack with size of 8388608 bytes D0713 08:45:21.003140 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.004219 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.004278 345766 usertrap_amd64.go:106] [ 1001: 1001] Map a usertrap vma at 69000 D0713 08:45:21.004370 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 1 D0713 08:45:21.004408 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:21.004784 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.004810 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 2 D0713 08:45:21.004821 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:21.005779 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.005815 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 3 D0713 08:45:21.005830 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:21.012442 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.012478 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 4 D0713 08:45:21.012493 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:21.013447 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.013467 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 5 D0713 08:45:21.013478 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:21.013525 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.013532 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 6 D0713 08:45:21.013540 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:21.013731 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.013749 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 7 D0713 08:45:21.013759 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:21.013906 345766 usertrap_amd64.go:212] [ 1001: 1002] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.013929 345766 usertrap_amd64.go:122] [ 1001: 1002] Allocate a new trap: 0xc0025fa030 8 D0713 08:45:21.013939 345766 usertrap_amd64.go:225] [ 1001: 1002] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:21.014056 345766 usertrap_amd64.go:212] [ 1001: 1002] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.014091 345766 usertrap_amd64.go:122] [ 1001: 1002] Allocate a new trap: 0xc0025fa030 9 D0713 08:45:21.014107 345766 usertrap_amd64.go:225] [ 1001: 1002] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:21.014216 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.014233 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 10 D0713 08:45:21.014243 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:21.020293 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.020313 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 11 D0713 08:45:21.020321 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:21.026004 345766 usertrap_amd64.go:212] [ 1001: 1002] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.026033 345766 usertrap_amd64.go:122] [ 1001: 1002] Allocate a new trap: 0xc0025fa030 12 D0713 08:45:21.026045 345766 usertrap_amd64.go:225] [ 1001: 1002] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:21.026097 345766 usertrap_amd64.go:212] [ 1001: 1002] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.026126 345766 usertrap_amd64.go:122] [ 1001: 1002] Allocate a new trap: 0xc0025fa030 13 D0713 08:45:21.026168 345766 usertrap_amd64.go:225] [ 1001: 1002] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:21.026221 345766 task_signals.go:470] [ 1001: 1001] Notified of signal 23 D0713 08:45:21.026299 345766 task_signals.go:220] [ 1001: 1001] Signal 23: delivering to handler I0713 08:45:21.030016 345766 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 08:45:21.030087 345766 usertrap_amd64.go:212] [ 1001: 1001] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.030144 345766 usertrap_amd64.go:122] [ 1001: 1001] Allocate a new trap: 0xc0025fa030 14 D0713 08:45:21.030166 345766 usertrap_amd64.go:225] [ 1001: 1001] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:21.030257 345766 task_exit.go:204] [ 1001: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.030289 345766 task_exit.go:204] [ 1001: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.030315 345766 task_signals.go:204] [ 1001: 1003] Signal 1001, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.030326 345766 task_signals.go:204] [ 1001: 1002] Signal 1001, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.030340 345766 task_exit.go:204] [ 1001: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.030358 345766 task_exit.go:204] [ 1001: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.030375 345766 task_exit.go:204] [ 1001: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.030356 345766 task_signals.go:204] [ 1001: 1006] Signal 1001, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.030407 345766 task_exit.go:204] [ 1001: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.030401 345766 task_signals.go:204] [ 1001: 1004] Signal 1001, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.030415 345766 task_exit.go:204] [ 1001: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.030421 345766 task_exit.go:204] [ 1001: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.030433 345766 task_exit.go:204] [ 1001: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.030469 345766 task_signals.go:204] [ 1001: 1005] Signal 1001, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.030502 345766 task_exit.go:204] [ 1001: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.030533 345766 task_exit.go:204] [ 1001: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.030547 345766 task_exit.go:204] [ 1001: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.030564 345766 task_exit.go:204] [ 1001: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.030568 345766 task_exit.go:204] [ 1001: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.030585 345766 task_exit.go:204] [ 1001: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.031705 345766 task_exit.go:204] [ 1001: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.031735 345766 task_exit.go:204] [ 1001: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.031748 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.031786 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:21.031812 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.031921 345766 task_exit.go:204] [ 1001: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.032065 345766 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 08:45:21.032152 345766 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 08:45:21.032551 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.034090 345766 syscalls.go:262] [ 1007: 1007] Allocating stack with size of 8388608 bytes D0713 08:45:21.034251 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.035526 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.035568 345766 usertrap_amd64.go:106] [ 1007: 1007] Map a usertrap vma at 68000 D0713 08:45:21.035625 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 1 D0713 08:45:21.035650 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:21.036002 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.036028 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 2 D0713 08:45:21.036041 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:21.036612 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.036627 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 3 D0713 08:45:21.036647 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:21.042386 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.042415 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 4 D0713 08:45:21.042426 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:21.043730 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.043757 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 5 D0713 08:45:21.043768 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:21.043839 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.043868 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 6 D0713 08:45:21.043877 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:21.044377 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.044409 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 7 D0713 08:45:21.044423 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:21.044587 345766 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.044615 345766 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc001ed2060 8 D0713 08:45:21.044627 345766 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:21.045072 345766 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.045097 345766 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc001ed2060 9 D0713 08:45:21.045107 345766 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:21.045120 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.045127 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 10 D0713 08:45:21.045135 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:21.051622 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.051644 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 11 D0713 08:45:21.051652 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:21.055516 345766 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.055556 345766 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc001ed2060 12 D0713 08:45:21.055570 345766 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:21.055656 345766 usertrap_amd64.go:212] [ 1007: 1008] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.055680 345766 usertrap_amd64.go:122] [ 1007: 1008] Allocate a new trap: 0xc001ed2060 13 D0713 08:45:21.055694 345766 usertrap_amd64.go:225] [ 1007: 1008] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:21.055720 345766 task_signals.go:470] [ 1007: 1007] Notified of signal 23 D0713 08:45:21.055862 345766 task_signals.go:220] [ 1007: 1007] Signal 23: delivering to handler D0713 08:45:21.060615 345766 usertrap_amd64.go:212] [ 1007: 1007] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.060649 345766 usertrap_amd64.go:122] [ 1007: 1007] Allocate a new trap: 0xc001ed2060 14 D0713 08:45:21.060660 345766 usertrap_amd64.go:225] [ 1007: 1007] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:21.060735 345766 task_exit.go:204] [ 1007: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.060759 345766 task_exit.go:204] [ 1007: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.060784 345766 task_signals.go:204] [ 1007: 1009] Signal 1007, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.060800 345766 task_signals.go:204] [ 1007: 1008] Signal 1007, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.060817 345766 task_exit.go:204] [ 1007: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.060821 345766 task_signals.go:204] [ 1007: 1010] Signal 1007, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.060833 345766 task_exit.go:204] [ 1007: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.060857 345766 task_signals.go:204] [ 1007: 1011] Signal 1007, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.060890 345766 task_signals.go:204] [ 1007: 1012] Signal 1007, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.060917 345766 task_exit.go:204] [ 1007: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.060929 345766 task_exit.go:204] [ 1007: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.060977 345766 task_exit.go:204] [ 1007: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.061002 345766 task_exit.go:204] [ 1007: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.061015 345766 task_exit.go:204] [ 1007: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.061027 345766 task_exit.go:204] [ 1007: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.061032 345766 task_exit.go:204] [ 1007: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.061040 345766 task_exit.go:204] [ 1007: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.061047 345766 task_exit.go:204] [ 1007: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.061059 345766 task_exit.go:204] [ 1007: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.061067 345766 task_exit.go:204] [ 1007: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.062127 345766 task_exit.go:204] [ 1007: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.062151 345766 task_exit.go:204] [ 1007: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.062169 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.062195 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:21.062202 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.062312 345766 task_exit.go:204] [ 1007: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.063085 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.064405 345766 syscalls.go:262] [ 1013: 1013] Allocating stack with size of 8388608 bytes D0713 08:45:21.064544 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.065648 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.065713 345766 usertrap_amd64.go:106] [ 1013: 1013] Map a usertrap vma at 6a000 D0713 08:45:21.065814 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 1 D0713 08:45:21.065841 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:21.066088 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.066107 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 2 D0713 08:45:21.066113 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:21.066457 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.066476 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 3 D0713 08:45:21.066482 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:21.071299 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.071328 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 4 D0713 08:45:21.071340 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:21.072254 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.072277 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 5 D0713 08:45:21.072286 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:21.072334 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.072347 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 6 D0713 08:45:21.072353 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:21.072514 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.072529 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 7 D0713 08:45:21.072534 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:21.072636 345766 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.072656 345766 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc000a2e300 8 D0713 08:45:21.072664 345766 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:21.072765 345766 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.072787 345766 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc000a2e300 9 D0713 08:45:21.072795 345766 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:21.072986 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.073028 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 10 D0713 08:45:21.073045 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:21.080716 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.080746 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 11 D0713 08:45:21.080756 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:21.083552 345766 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.083597 345766 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc000a2e300 12 D0713 08:45:21.083620 345766 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:21.083677 345766 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.083697 345766 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc000a2e300 13 D0713 08:45:21.083709 345766 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:21.083780 345766 task_signals.go:470] [ 1013: 1013] Notified of signal 23 D0713 08:45:21.083856 345766 task_signals.go:220] [ 1013: 1013] Signal 23: delivering to handler D0713 08:45:21.091628 345766 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.091707 345766 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000a2e300 14 D0713 08:45:21.091735 345766 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:21.091829 345766 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.091858 345766 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.091876 345766 task_signals.go:204] [ 1013: 1015] Signal 1013, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.091918 345766 task_signals.go:204] [ 1013: 1018] Signal 1013, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.091936 345766 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.091902 345766 task_signals.go:204] [ 1013: 1016] Signal 1013, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.091966 345766 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.091975 345766 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.091990 345766 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.092030 345766 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.092035 345766 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.092057 345766 task_exit.go:204] [ 1013: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.092073 345766 task_exit.go:204] [ 1013: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.092077 345766 task_exit.go:204] [ 1013: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.092096 345766 task_signals.go:204] [ 1013: 1014] Signal 1013, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.092113 345766 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.092118 345766 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.092122 345766 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.092134 345766 task_signals.go:204] [ 1013: 1017] Signal 1013, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.092148 345766 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.093560 345766 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.093611 345766 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.093630 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.093668 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.093776 345766 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.094682 345766 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.096219 345766 syscalls.go:262] [ 1019: 1019] Allocating stack with size of 8388608 bytes D0713 08:45:21.096484 345766 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.097684 345766 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.097731 345766 usertrap_amd64.go:106] [ 1019: 1019] Map a usertrap vma at 60000 D0713 08:45:21.097828 345766 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000418300 1 D0713 08:45:21.097858 345766 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:21.098321 345766 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.098343 345766 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000418300 2 D0713 08:45:21.098352 345766 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:21.098968 345766 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.098987 345766 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000418300 3 D0713 08:45:21.098994 345766 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:21.104705 345766 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.104731 345766 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000418300 4 D0713 08:45:21.104740 345766 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:21.105960 345766 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.105992 345766 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000418300 5 D0713 08:45:21.106004 345766 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:21.106057 345766 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.106063 345766 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000418300 6 D0713 08:45:21.106069 345766 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:21.106552 345766 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.106561 345766 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000418300 7 D0713 08:45:21.106568 345766 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:21.106797 345766 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.106827 345766 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc000418300 8 D0713 08:45:21.106838 345766 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:21.107006 345766 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.107022 345766 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc000418300 9 D0713 08:45:21.107029 345766 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:21.107138 345766 usertrap_amd64.go:212] [ 1019: 1022] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.107162 345766 usertrap_amd64.go:122] [ 1019: 1022] Allocate a new trap: 0xc000418300 10 D0713 08:45:21.107204 345766 usertrap_amd64.go:225] [ 1019: 1022] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:21.114695 345766 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.114724 345766 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000418300 11 D0713 08:45:21.114734 345766 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:21.117461 345766 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.117490 345766 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc000418300 12 D0713 08:45:21.117509 345766 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:21.117579 345766 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.117585 345766 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc000418300 13 D0713 08:45:21.117591 345766 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:21.117609 345766 task_signals.go:470] [ 1019: 1019] Notified of signal 23 D0713 08:45:21.117700 345766 task_signals.go:220] [ 1019: 1019] Signal 23: delivering to handler D0713 08:45:21.124370 345766 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.124396 345766 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000418300 14 D0713 08:45:21.124405 345766 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:21.124467 345766 task_exit.go:204] [ 1019: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.124491 345766 task_exit.go:204] [ 1019: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.124513 345766 task_signals.go:204] [ 1019: 1023] Signal 1019, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.124513 345766 task_signals.go:204] [ 1019: 1021] Signal 1019, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.124526 345766 task_exit.go:204] [ 1019: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.124542 345766 task_exit.go:204] [ 1019: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.124549 345766 task_exit.go:204] [ 1019: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.124564 345766 task_signals.go:204] [ 1019: 1020] Signal 1019, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.124581 345766 task_exit.go:204] [ 1019: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.124587 345766 task_exit.go:204] [ 1019: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.124591 345766 task_exit.go:204] [ 1019: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.124599 345766 task_signals.go:204] [ 1019: 1022] Signal 1019, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.124608 345766 task_exit.go:204] [ 1019: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.124613 345766 task_exit.go:204] [ 1019: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.124618 345766 task_exit.go:204] [ 1019: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.124625 345766 task_exit.go:204] [ 1019: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.125771 345766 task_exit.go:204] [ 1019: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.125796 345766 task_exit.go:204] [ 1019: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.125807 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.125878 345766 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 08:45:21.125901 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.125992 345766 task_exit.go:204] [ 1019: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.126881 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.128178 345766 syscalls.go:262] [ 1024: 1024] Allocating stack with size of 8388608 bytes D0713 08:45:21.128308 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.129499 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.129541 345766 usertrap_amd64.go:106] [ 1024: 1024] Map a usertrap vma at 60000 D0713 08:45:21.129610 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 1 D0713 08:45:21.129628 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:21.130052 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.130077 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 2 D0713 08:45:21.130087 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:21.130791 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.130817 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 3 D0713 08:45:21.130831 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:21.136422 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.136451 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 4 D0713 08:45:21.136464 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:21.137678 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.137708 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 5 D0713 08:45:21.137717 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:21.137783 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.137810 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 6 D0713 08:45:21.137818 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:21.138274 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.138292 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 7 D0713 08:45:21.138301 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:21.138500 345766 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.138531 345766 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc001ed2210 8 D0713 08:45:21.138545 345766 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:21.138714 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.138738 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 9 D0713 08:45:21.138746 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:21.138806 345766 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.138819 345766 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc001ed2210 10 D0713 08:45:21.138825 345766 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:21.139010 345766 usertrap_amd64.go:212] [ 1024: 1027] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.139038 345766 usertrap_amd64.go:122] [ 1024: 1027] Allocate a new trap: 0xc001ed2210 11 D0713 08:45:21.139052 345766 usertrap_amd64.go:225] [ 1024: 1027] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:21.145811 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.145834 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 12 D0713 08:45:21.145846 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:21.149476 345766 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.149502 345766 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc001ed2210 13 D0713 08:45:21.149513 345766 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:21.149644 345766 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.149672 345766 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc001ed2210 14 D0713 08:45:21.149684 345766 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:21.149742 345766 task_signals.go:470] [ 1024: 1024] Notified of signal 23 D0713 08:45:21.149903 345766 task_signals.go:220] [ 1024: 1024] Signal 23: delivering to handler D0713 08:45:21.155888 345766 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.155917 345766 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc001ed2210 15 D0713 08:45:21.155927 345766 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 08:45:21.156002 345766 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.156042 345766 task_signals.go:204] [ 1024: 1026] Signal 1024, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.156065 345766 task_signals.go:204] [ 1024: 1025] Signal 1024, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.156074 345766 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.156126 345766 task_signals.go:204] [ 1024: 1027] Signal 1024, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.156148 345766 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.156164 345766 task_signals.go:204] [ 1024: 1028] Signal 1024, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.156185 345766 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.156193 345766 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.156220 345766 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.156230 345766 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.156235 345766 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.156243 345766 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.156273 345766 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.156291 345766 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.156305 345766 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.157834 345766 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.157869 345766 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.157893 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.157920 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.157928 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.158050 345766 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.158746 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.160195 345766 syscalls.go:262] [ 1029: 1029] Allocating stack with size of 8388608 bytes D0713 08:45:21.160283 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.161808 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.161854 345766 usertrap_amd64.go:106] [ 1029: 1029] Map a usertrap vma at 60000 D0713 08:45:21.161959 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 1 D0713 08:45:21.161990 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:21.162441 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.162469 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 2 D0713 08:45:21.162479 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:21.163135 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.163154 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 3 D0713 08:45:21.163161 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:21.168725 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.168751 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 4 D0713 08:45:21.168759 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:21.169819 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.169848 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 5 D0713 08:45:21.169862 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:21.169907 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.169914 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 6 D0713 08:45:21.169920 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:21.170097 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.170113 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 7 D0713 08:45:21.170119 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:21.170183 345766 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.170191 345766 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0027be2d0 8 D0713 08:45:21.170196 345766 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:21.170401 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.170425 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 9 D0713 08:45:21.170435 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:21.170447 345766 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.170483 345766 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0027be2d0 10 D0713 08:45:21.170803 345766 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:21.177155 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.177183 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 11 D0713 08:45:21.177191 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:21.181240 345766 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.181281 345766 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0027be2d0 12 D0713 08:45:21.181298 345766 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:21.181378 345766 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.181388 345766 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0027be2d0 13 D0713 08:45:21.181397 345766 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:21.181454 345766 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0713 08:45:21.181590 345766 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler D0713 08:45:21.187012 345766 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.187031 345766 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0027be2d0 14 D0713 08:45:21.187056 345766 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:21.187134 345766 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.187157 345766 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.187183 345766 task_signals.go:204] [ 1029: 1032] Signal 1029, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.187200 345766 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.187198 345766 task_signals.go:204] [ 1029: 1033] Signal 1029, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.187211 345766 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.187220 345766 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.187186 345766 task_signals.go:204] [ 1029: 1031] Signal 1029, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.187254 345766 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.187267 345766 task_signals.go:204] [ 1029: 1030] Signal 1029, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.187282 345766 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.187298 345766 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.187329 345766 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.187346 345766 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.187352 345766 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.187372 345766 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.188519 345766 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.188543 345766 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.188557 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.188594 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.188604 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.188831 345766 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.189381 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.190601 345766 syscalls.go:262] [ 1034: 1034] Allocating stack with size of 8388608 bytes D0713 08:45:21.190731 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.192338 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.192382 345766 usertrap_amd64.go:106] [ 1034: 1034] Map a usertrap vma at 66000 D0713 08:45:21.192457 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 1 D0713 08:45:21.192481 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:21.192725 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.192742 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 2 D0713 08:45:21.192754 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:21.193246 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.193265 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 3 D0713 08:45:21.193272 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:21.198628 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.198653 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 4 D0713 08:45:21.198661 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:21.199772 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.199806 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 5 D0713 08:45:21.199818 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:21.199881 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.199891 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 6 D0713 08:45:21.199901 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:21.200350 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.200374 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 7 D0713 08:45:21.200381 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:21.200556 345766 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.200585 345766 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0013ae780 8 D0713 08:45:21.200594 345766 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:21.200815 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.200836 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 9 D0713 08:45:21.200882 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:21.200924 345766 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.200933 345766 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0013ae780 10 D0713 08:45:21.200960 345766 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:21.207843 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.207865 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 11 D0713 08:45:21.207877 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:21.211886 345766 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.211914 345766 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0013ae780 12 D0713 08:45:21.211953 345766 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:21.212059 345766 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.212088 345766 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc0013ae780 13 D0713 08:45:21.212100 345766 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:21.212151 345766 task_signals.go:470] [ 1034: 1034] Notified of signal 23 D0713 08:45:21.212300 345766 task_signals.go:220] [ 1034: 1034] Signal 23: delivering to handler D0713 08:45:21.218009 345766 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.218036 345766 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc0013ae780 14 D0713 08:45:21.218045 345766 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:21.218106 345766 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.218126 345766 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.218143 345766 task_signals.go:204] [ 1034: 1037] Signal 1034, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.218153 345766 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.218161 345766 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.218203 345766 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.218137 345766 task_signals.go:204] [ 1034: 1036] Signal 1034, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.218220 345766 task_signals.go:204] [ 1034: 1039] Signal 1034, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.218227 345766 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.218257 345766 task_signals.go:204] [ 1034: 1035] Signal 1034, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.218271 345766 task_exit.go:204] [ 1034: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.218304 345766 task_signals.go:204] [ 1034: 1038] Signal 1034, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.218332 345766 task_exit.go:204] [ 1034: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.218348 345766 task_exit.go:204] [ 1034: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.218360 345766 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.218368 345766 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.218392 345766 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.218423 345766 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.218428 345766 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.218436 345766 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.219750 345766 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.219785 345766 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.219799 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.219823 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.219829 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.219943 345766 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.220711 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.221913 345766 syscalls.go:262] [ 1040: 1040] Allocating stack with size of 8388608 bytes D0713 08:45:21.222018 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.223336 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.223371 345766 usertrap_amd64.go:106] [ 1040: 1040] Map a usertrap vma at 6a000 D0713 08:45:21.223441 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 1 D0713 08:45:21.223463 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:45:21.223957 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.223981 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 2 D0713 08:45:21.224011 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:45:21.224565 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.224598 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 3 D0713 08:45:21.224611 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:45:21.230711 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.230745 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 4 D0713 08:45:21.230754 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:45:21.232086 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.232109 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 5 D0713 08:45:21.232116 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:45:21.232173 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.232178 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 6 D0713 08:45:21.232184 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:45:21.232516 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.232533 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 7 D0713 08:45:21.232538 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:45:21.232664 345766 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.232676 345766 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0027be570 8 D0713 08:45:21.232685 345766 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:45:21.232842 345766 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.232862 345766 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0027be570 9 D0713 08:45:21.232869 345766 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:45:21.233054 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.233094 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 10 D0713 08:45:21.233109 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:45:21.240765 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.240818 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 11 D0713 08:45:21.240833 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:45:21.243488 345766 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.243522 345766 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0027be570 12 D0713 08:45:21.243537 345766 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:45:21.243635 345766 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.243646 345766 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc0027be570 13 D0713 08:45:21.243652 345766 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:45:21.243668 345766 task_signals.go:470] [ 1040: 1040] Notified of signal 23 D0713 08:45:21.243763 345766 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler D0713 08:45:21.251569 345766 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.251596 345766 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc0027be570 14 D0713 08:45:21.251606 345766 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:45:21.251670 345766 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.251746 345766 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.251775 345766 task_signals.go:204] [ 1040: 1042] Signal 1040, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.251799 345766 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.251805 345766 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.251818 345766 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.251851 345766 task_signals.go:204] [ 1040: 1041] Signal 1040, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.251877 345766 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.251884 345766 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.251888 345766 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.251897 345766 task_signals.go:204] [ 1040: 1043] Signal 1040, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.251904 345766 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.251909 345766 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.251918 345766 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.251927 345766 task_signals.go:204] [ 1040: 1044] Signal 1040, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.251944 345766 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.253325 345766 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.253363 345766 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.253378 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.253405 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.253435 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.253516 345766 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.254175 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.255476 345766 syscalls.go:262] [ 1045: 1045] Allocating stack with size of 8388608 bytes D0713 08:45:21.255589 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.256930 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.257033 345766 usertrap_amd64.go:106] [ 1045: 1045] Map a usertrap vma at 61000 D0713 08:45:21.257115 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 1 D0713 08:45:21.257134 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:21.257378 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.257399 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 2 D0713 08:45:21.257406 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:21.257946 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.257968 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 3 D0713 08:45:21.257976 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:21.262541 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.262567 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 4 D0713 08:45:21.262577 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:21.263686 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.263718 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 5 D0713 08:45:21.263728 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:21.263773 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.263790 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 6 D0713 08:45:21.263795 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:21.263944 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.263958 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 7 D0713 08:45:21.263964 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:21.264067 345766 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.264103 345766 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0025fa3f0 8 D0713 08:45:21.264110 345766 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:21.264359 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.264399 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 9 D0713 08:45:21.264415 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:21.264536 345766 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.264557 345766 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0025fa3f0 10 D0713 08:45:21.264566 345766 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:21.271744 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.271783 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 11 D0713 08:45:21.271794 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:21.275842 345766 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.275871 345766 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0025fa3f0 12 D0713 08:45:21.275881 345766 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:21.275964 345766 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.275985 345766 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0025fa3f0 13 D0713 08:45:21.275995 345766 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:21.276023 345766 task_signals.go:470] [ 1045: 1045] Notified of signal 23 D0713 08:45:21.276063 345766 task_signals.go:179] [ 1045: 1045] Restarting syscall 202: interrupted by signal 23 D0713 08:45:21.276072 345766 task_signals.go:220] [ 1045: 1045] Signal 23: delivering to handler I0713 08:45:21.281230 345766 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 08:45:21.281299 345766 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.281307 345766 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0025fa3f0 14 D0713 08:45:21.281316 345766 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:21.281346 345766 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.281367 345766 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.281386 345766 task_signals.go:204] [ 1045: 1046] Signal 1045, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.281399 345766 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.281408 345766 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.281414 345766 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.281406 345766 task_signals.go:204] [ 1045: 1048] Signal 1045, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.281428 345766 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.281442 345766 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.281441 345766 task_signals.go:204] [ 1045: 1047] Signal 1045, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.281448 345766 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.281465 345766 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.281465 345766 task_signals.go:204] [ 1045: 1050] Signal 1045, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.281475 345766 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.281482 345766 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.281499 345766 task_signals.go:204] [ 1045: 1049] Signal 1045, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.281521 345766 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.281530 345766 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.281535 345766 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.281546 345766 task_exit.go:204] [ 1045: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.282753 345766 task_exit.go:204] [ 1045: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.282771 345766 task_exit.go:204] [ 1045: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.282785 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.282813 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.282835 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.282984 345766 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.283664 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.285227 345766 syscalls.go:262] [ 1051: 1051] Allocating stack with size of 8388608 bytes D0713 08:45:21.285341 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.286504 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.286548 345766 usertrap_amd64.go:106] [ 1051: 1051] Map a usertrap vma at 67000 D0713 08:45:21.286630 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 1 D0713 08:45:21.286653 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:21.287020 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.287038 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 2 D0713 08:45:21.287044 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:21.287700 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.287722 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 3 D0713 08:45:21.287732 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:21.292447 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.292471 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 4 D0713 08:45:21.292480 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:21.293484 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.293513 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 5 D0713 08:45:21.293525 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:21.293581 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.293593 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 6 D0713 08:45:21.293598 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:21.293739 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.293750 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 7 D0713 08:45:21.293755 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:21.293869 345766 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.293881 345766 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000a2eb70 8 D0713 08:45:21.293887 345766 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:21.294089 345766 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.294110 345766 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000a2eb70 9 D0713 08:45:21.294124 345766 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:21.294180 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.294190 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 10 D0713 08:45:21.294199 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:21.301425 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.301466 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 11 D0713 08:45:21.301488 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:21.304327 345766 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.304355 345766 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000a2eb70 12 D0713 08:45:21.304390 345766 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:21.304429 345766 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.304443 345766 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000a2eb70 13 D0713 08:45:21.304476 345766 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:21.304535 345766 task_signals.go:470] [ 1051: 1051] Notified of signal 23 D0713 08:45:21.304626 345766 task_signals.go:220] [ 1051: 1051] Signal 23: delivering to handler I0713 08:45:21.312464 345766 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 08:45:21.312584 345766 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.312603 345766 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000a2eb70 14 D0713 08:45:21.312613 345766 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:21.312690 345766 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.312709 345766 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.312736 345766 task_signals.go:204] [ 1051: 1054] Signal 1051, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.312741 345766 task_signals.go:204] [ 1051: 1053] Signal 1051, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.312754 345766 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.312763 345766 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.312768 345766 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.312759 345766 task_signals.go:204] [ 1051: 1055] Signal 1051, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.312782 345766 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.312805 345766 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.312810 345766 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.312820 345766 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.312825 345766 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.312829 345766 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.312837 345766 task_signals.go:204] [ 1051: 1052] Signal 1051, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.312844 345766 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.314053 345766 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.314080 345766 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.314091 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.314135 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.314156 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.314229 345766 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.314742 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.315980 345766 syscalls.go:262] [ 1056: 1056] Allocating stack with size of 8388608 bytes D0713 08:45:21.316066 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.317215 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.317252 345766 usertrap_amd64.go:106] [ 1056: 1056] Map a usertrap vma at 68000 D0713 08:45:21.317421 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 1 D0713 08:45:21.317460 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:21.317923 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.317941 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 2 D0713 08:45:21.317947 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:21.318719 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.318737 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 3 D0713 08:45:21.318743 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:21.324814 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.324857 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 4 D0713 08:45:21.324882 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:21.326185 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.326219 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 5 D0713 08:45:21.326231 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:21.326297 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.326306 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 6 D0713 08:45:21.326314 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:21.326560 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.326580 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 7 D0713 08:45:21.326590 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:21.326746 345766 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.326765 345766 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc000a2ed20 8 D0713 08:45:21.326774 345766 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:21.326955 345766 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.326994 345766 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc000a2ed20 9 D0713 08:45:21.327008 345766 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:21.327103 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.327122 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 10 D0713 08:45:21.327130 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:21.327768 345766 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.327792 345766 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc000a2ed20 11 D0713 08:45:21.327803 345766 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:21.327856 345766 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.327870 345766 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc000a2ed20 12 D0713 08:45:21.327879 345766 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:21.327896 345766 task_signals.go:470] [ 1056: 1056] Notified of signal 23 D0713 08:45:21.327910 345766 task_signals.go:220] [ 1056: 1056] Signal 23: delivering to handler D0713 08:45:21.334938 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.334961 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 13 D0713 08:45:21.334975 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:21.338506 345766 task_signals.go:470] [ 1056: 1056] Notified of signal 23 D0713 08:45:21.338568 345766 task_signals.go:220] [ 1056: 1056] Signal 23: delivering to handler I0713 08:45:21.345343 345766 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 08:45:21.345428 345766 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.345439 345766 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc000a2ed20 14 D0713 08:45:21.345448 345766 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:21.345480 345766 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.345513 345766 task_signals.go:204] [ 1056: 1057] Signal 1056, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.345539 345766 task_signals.go:204] [ 1056: 1061] Signal 1056, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.345542 345766 task_signals.go:204] [ 1056: 1059] Signal 1056, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.345571 345766 task_signals.go:204] [ 1056: 1058] Signal 1056, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.345589 345766 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.345606 345766 task_signals.go:204] [ 1056: 1060] Signal 1056, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.345615 345766 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.345670 345766 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.345682 345766 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.345696 345766 task_exit.go:204] [ 1056: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.345721 345766 task_exit.go:204] [ 1056: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.345732 345766 task_exit.go:204] [ 1056: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.345756 345766 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.345764 345766 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.345769 345766 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.345783 345766 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.345798 345766 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.345806 345766 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.345829 345766 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.347066 345766 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.347118 345766 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.347132 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.347165 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.347174 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.347221 345766 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.347843 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.349327 345766 syscalls.go:262] [ 1062: 1062] Allocating stack with size of 8388608 bytes D0713 08:45:21.349495 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.351031 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.351064 345766 usertrap_amd64.go:106] [ 1062: 1062] Map a usertrap vma at 61000 D0713 08:45:21.351151 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 1 D0713 08:45:21.351169 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:21.351455 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.351486 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 2 D0713 08:45:21.351496 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:21.352057 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.352079 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 3 D0713 08:45:21.352092 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:21.357608 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.357637 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 4 D0713 08:45:21.357646 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:21.358830 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.358855 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 5 D0713 08:45:21.358864 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:21.358930 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.358936 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 6 D0713 08:45:21.358947 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:21.359148 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.359165 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 7 D0713 08:45:21.359174 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:21.359286 345766 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.359311 345766 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc0025fa540 8 D0713 08:45:21.359320 345766 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:21.359445 345766 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.359465 345766 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc0025fa540 9 D0713 08:45:21.359474 345766 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:21.359624 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.359648 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 10 D0713 08:45:21.359660 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:21.367377 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.367401 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 11 D0713 08:45:21.367408 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:21.370175 345766 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.370214 345766 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc0025fa540 12 D0713 08:45:21.370226 345766 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:21.370263 345766 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.370276 345766 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc0025fa540 13 D0713 08:45:21.370286 345766 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:21.370370 345766 task_signals.go:470] [ 1062: 1062] Notified of signal 23 D0713 08:45:21.370453 345766 task_signals.go:220] [ 1062: 1062] Signal 23: delivering to handler I0713 08:45:21.377830 345766 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 08:45:21.377952 345766 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.377968 345766 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc0025fa540 14 D0713 08:45:21.377976 345766 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:21.378090 345766 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.378111 345766 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.378129 345766 task_signals.go:204] [ 1062: 1065] Signal 1062, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.378128 345766 task_signals.go:204] [ 1062: 1064] Signal 1062, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.378138 345766 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.378158 345766 task_signals.go:204] [ 1062: 1063] Signal 1062, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.378172 345766 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.378187 345766 task_signals.go:204] [ 1062: 1066] Signal 1062, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.378196 345766 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.378204 345766 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.378214 345766 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.378218 345766 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.378225 345766 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.378231 345766 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.378235 345766 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.378255 345766 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.379579 345766 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.379604 345766 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.379613 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.379669 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.379686 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.379788 345766 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.380281 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.381662 345766 syscalls.go:262] [ 1067: 1067] Allocating stack with size of 8388608 bytes D0713 08:45:21.381749 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.383176 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.383214 345766 usertrap_amd64.go:106] [ 1067: 1067] Map a usertrap vma at 62000 D0713 08:45:21.383325 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 1 D0713 08:45:21.383354 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:21.383722 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.383739 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 2 D0713 08:45:21.383746 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:21.384444 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.384488 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 3 D0713 08:45:21.384498 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:21.389972 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.389999 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 4 D0713 08:45:21.390009 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:21.391045 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.391064 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 5 D0713 08:45:21.391071 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:21.391136 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.391141 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 6 D0713 08:45:21.391146 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:21.391541 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.391556 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 7 D0713 08:45:21.391562 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:21.391630 345766 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.391646 345766 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc001ed2f30 8 D0713 08:45:21.391658 345766 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:21.391861 345766 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.391884 345766 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc001ed2f30 9 D0713 08:45:21.391893 345766 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:21.391940 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.391955 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 10 D0713 08:45:21.391966 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:21.392070 345766 usertrap_amd64.go:212] [ 1067: 1070] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.392102 345766 usertrap_amd64.go:122] [ 1067: 1070] Allocate a new trap: 0xc001ed2f30 11 D0713 08:45:21.392115 345766 usertrap_amd64.go:225] [ 1067: 1070] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:21.399093 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.399113 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 12 D0713 08:45:21.399121 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:21.402628 345766 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.402654 345766 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc001ed2f30 13 D0713 08:45:21.402662 345766 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:21.402760 345766 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.402765 345766 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc001ed2f30 14 D0713 08:45:21.402770 345766 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:21.402799 345766 task_signals.go:470] [ 1067: 1067] Notified of signal 23 D0713 08:45:21.402858 345766 task_signals.go:220] [ 1067: 1067] Signal 23: delivering to handler D0713 08:45:21.408666 345766 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.408692 345766 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc001ed2f30 15 D0713 08:45:21.408702 345766 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:21.408753 345766 task_exit.go:204] [ 1067: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.408769 345766 task_exit.go:204] [ 1067: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.408772 345766 task_signals.go:204] [ 1067: 1069] Signal 1067, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.408789 345766 task_exit.go:204] [ 1067: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.408789 345766 task_signals.go:204] [ 1067: 1070] Signal 1067, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.408798 345766 task_exit.go:204] [ 1067: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.408816 345766 task_exit.go:204] [ 1067: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.408852 345766 task_signals.go:204] [ 1067: 1071] Signal 1067, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.408874 345766 task_exit.go:204] [ 1067: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.408908 345766 task_signals.go:204] [ 1067: 1068] Signal 1067, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.408934 345766 task_exit.go:204] [ 1067: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.408975 345766 task_exit.go:204] [ 1067: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.408989 345766 task_exit.go:204] [ 1067: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.408999 345766 task_exit.go:204] [ 1067: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.409004 345766 task_exit.go:204] [ 1067: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.409013 345766 task_exit.go:204] [ 1067: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.410189 345766 task_exit.go:204] [ 1067: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.410209 345766 task_exit.go:204] [ 1067: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.410224 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.410273 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.410290 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.410412 345766 task_exit.go:204] [ 1067: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.410944 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.412292 345766 syscalls.go:262] [ 1072: 1072] Allocating stack with size of 8388608 bytes D0713 08:45:21.412366 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.413355 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.413388 345766 usertrap_amd64.go:106] [ 1072: 1072] Map a usertrap vma at 62000 D0713 08:45:21.413471 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 1 D0713 08:45:21.413495 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:45:21.413693 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.413701 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 2 D0713 08:45:21.413707 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:45:21.414156 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.414172 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 3 D0713 08:45:21.414177 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:45:21.419697 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.419720 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 4 D0713 08:45:21.419733 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:45:21.421025 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.421046 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 5 D0713 08:45:21.421054 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:45:21.421097 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.421103 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 6 D0713 08:45:21.421110 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:45:21.421274 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.421286 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 7 D0713 08:45:21.421293 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:45:21.421352 345766 usertrap_amd64.go:212] [ 1072: 1073] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.421367 345766 usertrap_amd64.go:122] [ 1072: 1073] Allocate a new trap: 0xc000a2f110 8 D0713 08:45:21.421373 345766 usertrap_amd64.go:225] [ 1072: 1073] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:45:21.421526 345766 usertrap_amd64.go:212] [ 1072: 1073] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.421545 345766 usertrap_amd64.go:122] [ 1072: 1073] Allocate a new trap: 0xc000a2f110 9 D0713 08:45:21.421552 345766 usertrap_amd64.go:225] [ 1072: 1073] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:45:21.421566 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.421570 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 10 D0713 08:45:21.421576 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:45:21.421763 345766 usertrap_amd64.go:212] [ 1072: 1075] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.421784 345766 usertrap_amd64.go:122] [ 1072: 1075] Allocate a new trap: 0xc000a2f110 11 D0713 08:45:21.421796 345766 usertrap_amd64.go:225] [ 1072: 1075] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:45:21.428767 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.428791 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 12 D0713 08:45:21.428803 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:45:21.433068 345766 usertrap_amd64.go:212] [ 1072: 1073] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.433158 345766 usertrap_amd64.go:122] [ 1072: 1073] Allocate a new trap: 0xc000a2f110 13 D0713 08:45:21.433209 345766 usertrap_amd64.go:225] [ 1072: 1073] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:45:21.433294 345766 usertrap_amd64.go:212] [ 1072: 1073] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.433314 345766 usertrap_amd64.go:122] [ 1072: 1073] Allocate a new trap: 0xc000a2f110 14 D0713 08:45:21.433320 345766 usertrap_amd64.go:225] [ 1072: 1073] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:45:21.433348 345766 task_signals.go:470] [ 1072: 1072] Notified of signal 23 D0713 08:45:21.433454 345766 task_signals.go:220] [ 1072: 1072] Signal 23: delivering to handler D0713 08:45:21.439448 345766 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.439473 345766 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000a2f110 15 D0713 08:45:21.439483 345766 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 08:45:21.439541 345766 task_exit.go:204] [ 1072: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.439556 345766 task_exit.go:204] [ 1072: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.439576 345766 task_signals.go:204] [ 1072: 1075] Signal 1072, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.439572 345766 task_signals.go:204] [ 1072: 1074] Signal 1072, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.439587 345766 task_exit.go:204] [ 1072: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.439604 345766 task_signals.go:204] [ 1072: 1073] Signal 1072, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.439619 345766 task_exit.go:204] [ 1072: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.439623 345766 task_exit.go:204] [ 1072: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.439634 345766 task_signals.go:204] [ 1072: 1076] Signal 1072, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.439640 345766 task_exit.go:204] [ 1072: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.439645 345766 task_exit.go:204] [ 1072: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.439649 345766 task_exit.go:204] [ 1072: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.439654 345766 task_exit.go:204] [ 1072: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.439659 345766 task_exit.go:204] [ 1072: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.439662 345766 task_exit.go:204] [ 1072: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.439670 345766 task_exit.go:204] [ 1072: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.441254 345766 task_exit.go:204] [ 1072: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.441267 345766 task_exit.go:204] [ 1072: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.441276 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.441356 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.441396 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.441397 345766 task_exit.go:204] [ 1072: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.442400 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.443996 345766 syscalls.go:262] [ 1077: 1077] Allocating stack with size of 8388608 bytes D0713 08:45:21.444097 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.445328 345766 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.445439 345766 usertrap_amd64.go:106] [ 1077: 1077] Map a usertrap vma at 64000 D0713 08:45:21.445550 345766 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc0027be8a0 1 D0713 08:45:21.445575 345766 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:21.446144 345766 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.446170 345766 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc0027be8a0 2 D0713 08:45:21.446179 345766 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:21.446743 345766 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.446769 345766 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc0027be8a0 3 D0713 08:45:21.446775 345766 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:21.452968 345766 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.452985 345766 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc0027be8a0 4 D0713 08:45:21.452997 345766 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:21.454120 345766 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.454176 345766 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc0027be8a0 5 D0713 08:45:21.454192 345766 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:21.454259 345766 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.454275 345766 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc0027be8a0 6 D0713 08:45:21.454282 345766 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:21.454731 345766 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.454770 345766 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc0027be8a0 7 D0713 08:45:21.454788 345766 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:21.454963 345766 usertrap_amd64.go:212] [ 1077: 1078] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.454984 345766 usertrap_amd64.go:122] [ 1077: 1078] Allocate a new trap: 0xc0027be8a0 8 D0713 08:45:21.454993 345766 usertrap_amd64.go:225] [ 1077: 1078] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:21.455160 345766 usertrap_amd64.go:212] [ 1077: 1078] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.455176 345766 usertrap_amd64.go:122] [ 1077: 1078] Allocate a new trap: 0xc0027be8a0 9 D0713 08:45:21.455182 345766 usertrap_amd64.go:225] [ 1077: 1078] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:21.455232 345766 usertrap_amd64.go:212] [ 1077: 1079] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.455243 345766 usertrap_amd64.go:122] [ 1077: 1079] Allocate a new trap: 0xc0027be8a0 10 D0713 08:45:21.455252 345766 usertrap_amd64.go:225] [ 1077: 1079] Apply the binary patch addr 46b6e0 trap addr 64320 ([184 24 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:21.455279 345766 usertrap_amd64.go:212] [ 1077: 1079] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.455301 345766 usertrap_amd64.go:122] [ 1077: 1079] Allocate a new trap: 0xc0027be8a0 11 D0713 08:45:21.455312 345766 usertrap_amd64.go:225] [ 1077: 1079] Apply the binary patch addr 46b57c trap addr 64370 ([184 202 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:21.461876 345766 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.461898 345766 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc0027be8a0 12 D0713 08:45:21.461906 345766 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:21.465730 345766 usertrap_amd64.go:212] [ 1077: 1078] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.465755 345766 usertrap_amd64.go:122] [ 1077: 1078] Allocate a new trap: 0xc0027be8a0 13 D0713 08:45:21.465765 345766 usertrap_amd64.go:225] [ 1077: 1078] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:21.465781 345766 usertrap_amd64.go:212] [ 1077: 1078] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.465785 345766 usertrap_amd64.go:122] [ 1077: 1078] Allocate a new trap: 0xc0027be8a0 14 D0713 08:45:21.465793 345766 usertrap_amd64.go:225] [ 1077: 1078] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:21.465813 345766 task_signals.go:470] [ 1077: 1077] Notified of signal 23 D0713 08:45:21.465846 345766 task_signals.go:220] [ 1077: 1077] Signal 23: delivering to handler D0713 08:45:21.471618 345766 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.471641 345766 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc0027be8a0 15 D0713 08:45:21.471650 345766 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 08:45:21.471710 345766 task_exit.go:204] [ 1077: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.471725 345766 task_exit.go:204] [ 1077: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.471746 345766 task_signals.go:204] [ 1077: 1081] Signal 1077, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.471762 345766 task_exit.go:204] [ 1077: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.471760 345766 task_signals.go:204] [ 1077: 1080] Signal 1077, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.471767 345766 task_exit.go:204] [ 1077: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.471777 345766 task_exit.go:204] [ 1077: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.471745 345766 task_signals.go:204] [ 1077: 1079] Signal 1077, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.471806 345766 task_exit.go:204] [ 1077: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.471814 345766 task_signals.go:204] [ 1077: 1078] Signal 1077, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.471822 345766 task_exit.go:204] [ 1077: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.471830 345766 task_exit.go:204] [ 1077: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.471841 345766 task_exit.go:204] [ 1077: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.471848 345766 task_exit.go:204] [ 1077: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.471852 345766 task_exit.go:204] [ 1077: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.471863 345766 task_exit.go:204] [ 1077: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.473444 345766 task_exit.go:204] [ 1077: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.473465 345766 task_exit.go:204] [ 1077: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.473475 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.473528 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.473542 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.473612 345766 task_exit.go:204] [ 1077: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.474234 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.475625 345766 syscalls.go:262] [ 1082: 1082] Allocating stack with size of 8388608 bytes D0713 08:45:21.475744 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.476695 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.476738 345766 usertrap_amd64.go:106] [ 1082: 1082] Map a usertrap vma at 67000 D0713 08:45:21.477183 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 1 D0713 08:45:21.477215 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:21.477510 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.477526 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 2 D0713 08:45:21.477534 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:21.478352 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.478381 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 3 D0713 08:45:21.478394 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:21.483879 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.483910 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 4 D0713 08:45:21.483922 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:21.485237 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.485276 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 5 D0713 08:45:21.485291 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:21.485355 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.485376 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 6 D0713 08:45:21.485386 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:21.485937 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.485960 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 7 D0713 08:45:21.485969 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:21.486116 345766 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.486141 345766 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc001ed33b0 8 D0713 08:45:21.486153 345766 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:21.486266 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.486287 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 9 D0713 08:45:21.486297 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:21.486333 345766 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.486352 345766 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc001ed33b0 10 D0713 08:45:21.486399 345766 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:21.493323 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.493354 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 11 D0713 08:45:21.493367 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:21.497000 345766 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.497062 345766 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc001ed33b0 12 D0713 08:45:21.497078 345766 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:21.497123 345766 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.497153 345766 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc001ed33b0 13 D0713 08:45:21.497164 345766 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:21.497282 345766 task_signals.go:470] [ 1082: 1082] Notified of signal 23 D0713 08:45:21.497393 345766 task_signals.go:220] [ 1082: 1082] Signal 23: delivering to handler D0713 08:45:21.503266 345766 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.503289 345766 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc001ed33b0 14 D0713 08:45:21.503298 345766 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:21.503369 345766 task_exit.go:204] [ 1082: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.503396 345766 task_exit.go:204] [ 1082: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.503418 345766 task_signals.go:204] [ 1082: 1085] Signal 1082, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.503416 345766 task_signals.go:204] [ 1082: 1084] Signal 1082, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.503431 345766 task_exit.go:204] [ 1082: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.503441 345766 task_exit.go:204] [ 1082: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.503473 345766 task_exit.go:204] [ 1082: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.503478 345766 task_exit.go:204] [ 1082: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.503507 345766 task_signals.go:204] [ 1082: 1086] Signal 1082, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.503527 345766 task_exit.go:204] [ 1082: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.503538 345766 task_exit.go:204] [ 1082: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.503550 345766 task_exit.go:204] [ 1082: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.503561 345766 task_exit.go:204] [ 1082: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.503571 345766 task_exit.go:204] [ 1082: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.503551 345766 task_signals.go:204] [ 1082: 1083] Signal 1082, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.503595 345766 task_exit.go:204] [ 1082: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.505406 345766 task_exit.go:204] [ 1082: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.505436 345766 task_exit.go:204] [ 1082: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.505449 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.505566 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.505657 345766 task_exit.go:204] [ 1082: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.505669 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.506473 345766 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.508268 345766 syscalls.go:262] [ 1087: 1087] Allocating stack with size of 8388608 bytes D0713 08:45:21.508410 345766 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.509765 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.509807 345766 usertrap_amd64.go:106] [ 1087: 1087] Map a usertrap vma at 67000 D0713 08:45:21.509902 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 1 D0713 08:45:21.509929 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:21.510347 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.510366 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 2 D0713 08:45:21.510373 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:21.511106 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.511128 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 3 D0713 08:45:21.511140 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:21.517982 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.518008 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 4 D0713 08:45:21.518018 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:21.519110 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.519130 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 5 D0713 08:45:21.519138 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:21.519203 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.519209 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 6 D0713 08:45:21.519214 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:21.519609 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.519626 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 7 D0713 08:45:21.519632 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:21.519729 345766 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.519741 345766 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc000a2f380 8 D0713 08:45:21.519750 345766 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:21.519883 345766 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.519896 345766 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc000a2f380 9 D0713 08:45:21.519903 345766 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:21.519938 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.519950 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 10 D0713 08:45:21.519956 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:21.520584 345766 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.520607 345766 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc000a2f380 11 D0713 08:45:21.520617 345766 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:21.520687 345766 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.520701 345766 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc000a2f380 12 D0713 08:45:21.520749 345766 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:21.520805 345766 task_signals.go:470] [ 1087: 1087] Notified of signal 23 D0713 08:45:21.520886 345766 task_signals.go:220] [ 1087: 1087] Signal 23: delivering to handler D0713 08:45:21.528799 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.528824 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 13 D0713 08:45:21.528832 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:21.532377 345766 task_signals.go:470] [ 1087: 1087] Notified of signal 23 D0713 08:45:21.532491 345766 task_signals.go:220] [ 1087: 1087] Signal 23: delivering to handler D0713 08:45:21.539840 345766 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.539876 345766 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc000a2f380 14 D0713 08:45:21.539890 345766 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:21.539965 345766 task_exit.go:204] [ 1087: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.539995 345766 task_exit.go:204] [ 1087: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.540012 345766 task_signals.go:204] [ 1087: 1089] Signal 1087, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.540027 345766 task_signals.go:204] [ 1087: 1090] Signal 1087, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.540042 345766 task_signals.go:204] [ 1087: 1091] Signal 1087, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.540045 345766 task_exit.go:204] [ 1087: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.540072 345766 task_exit.go:204] [ 1087: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.540080 345766 task_exit.go:204] [ 1087: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.540096 345766 task_exit.go:204] [ 1087: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.540103 345766 task_exit.go:204] [ 1087: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.540108 345766 task_exit.go:204] [ 1087: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.540133 345766 task_signals.go:204] [ 1087: 1088] Signal 1087, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.540147 345766 task_exit.go:204] [ 1087: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.540193 345766 task_exit.go:204] [ 1087: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.540207 345766 task_exit.go:204] [ 1087: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.540219 345766 task_exit.go:204] [ 1087: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.541714 345766 task_exit.go:204] [ 1087: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.541735 345766 task_exit.go:204] [ 1087: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.541746 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.541867 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.541898 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.542015 345766 task_exit.go:204] [ 1087: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.542667 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.544149 345766 syscalls.go:262] [ 1092: 1092] Allocating stack with size of 8388608 bytes D0713 08:45:21.544244 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.545674 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.545713 345766 usertrap_amd64.go:106] [ 1092: 1092] Map a usertrap vma at 67000 D0713 08:45:21.545808 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 1 D0713 08:45:21.545841 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:21.546368 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.546380 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 2 D0713 08:45:21.546389 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:21.547240 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.547263 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 3 D0713 08:45:21.547272 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:21.553191 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.553218 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 4 D0713 08:45:21.553230 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:21.554302 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.554323 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 5 D0713 08:45:21.554331 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:21.554380 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.554397 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 6 D0713 08:45:21.554403 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:21.554570 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.554584 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 7 D0713 08:45:21.554594 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:21.554701 345766 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.554714 345766 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0013af1a0 8 D0713 08:45:21.554721 345766 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:21.554878 345766 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.554893 345766 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0013af1a0 9 D0713 08:45:21.554901 345766 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:21.555147 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.555186 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 10 D0713 08:45:21.555206 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:21.562385 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.562410 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 11 D0713 08:45:21.562429 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:21.565422 345766 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.565460 345766 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0013af1a0 12 D0713 08:45:21.565473 345766 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:21.565541 345766 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.565559 345766 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0013af1a0 13 D0713 08:45:21.565574 345766 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:21.565756 345766 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0713 08:45:21.565844 345766 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler I0713 08:45:21.573409 345766 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 08:45:21.573517 345766 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.573542 345766 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0013af1a0 14 D0713 08:45:21.573558 345766 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:45:21.573614 345766 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.573643 345766 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.573664 345766 task_signals.go:204] [ 1092: 1096] Signal 1092, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.573657 345766 task_signals.go:204] [ 1092: 1095] Signal 1092, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.573678 345766 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.573686 345766 task_signals.go:204] [ 1092: 1093] Signal 1092, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.573679 345766 task_signals.go:204] [ 1092: 1094] Signal 1092, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.573716 345766 task_signals.go:204] [ 1092: 1097] Signal 1092, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.573721 345766 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.573740 345766 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.573766 345766 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.573777 345766 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.573780 345766 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.573792 345766 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.573806 345766 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.573811 345766 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.573820 345766 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.573833 345766 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.573840 345766 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.573855 345766 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.575316 345766 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.575342 345766 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.575354 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.575385 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.575403 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.575532 345766 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.576203 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.577720 345766 syscalls.go:262] [ 1098: 1098] Allocating stack with size of 8388608 bytes D0713 08:45:21.577929 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.579552 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.579598 345766 usertrap_amd64.go:106] [ 1098: 1098] Map a usertrap vma at 64000 D0713 08:45:21.579675 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 1 D0713 08:45:21.579694 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:21.579995 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.580011 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 2 D0713 08:45:21.580019 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:21.580598 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.580625 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 3 D0713 08:45:21.580637 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:21.586526 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.586553 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 4 D0713 08:45:21.586563 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:21.587558 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.587577 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 5 D0713 08:45:21.587583 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:21.587628 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.587642 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 6 D0713 08:45:21.587647 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:21.587879 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.587898 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 7 D0713 08:45:21.587906 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:21.588038 345766 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.588045 345766 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc000419260 8 D0713 08:45:21.588052 345766 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:21.588221 345766 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.588239 345766 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc000419260 9 D0713 08:45:21.588244 345766 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:21.588270 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.588275 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 10 D0713 08:45:21.588312 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:21.596730 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.596760 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 11 D0713 08:45:21.596771 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:21.599195 345766 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.599221 345766 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc000419260 12 D0713 08:45:21.599232 345766 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:21.599286 345766 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.599298 345766 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc000419260 13 D0713 08:45:21.599304 345766 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:21.599338 345766 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0713 08:45:21.599430 345766 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler I0713 08:45:21.607849 345766 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 08:45:21.608033 345766 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.608052 345766 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000419260 14 D0713 08:45:21.608070 345766 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:21.608180 345766 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.608222 345766 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.608247 345766 task_signals.go:204] [ 1098: 1102] Signal 1098, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.608250 345766 task_signals.go:204] [ 1098: 1101] Signal 1098, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.608244 345766 task_signals.go:204] [ 1098: 1100] Signal 1098, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.608277 345766 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.608267 345766 task_signals.go:204] [ 1098: 1099] Signal 1098, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.608307 345766 task_signals.go:204] [ 1098: 1103] Signal 1098, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.608335 345766 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.608348 345766 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.608361 345766 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.608368 345766 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.608372 345766 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.608381 345766 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.608389 345766 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.608393 345766 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.608401 345766 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.608424 345766 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.608435 345766 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.608449 345766 task_exit.go:204] [ 1098: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.609974 345766 task_exit.go:204] [ 1098: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.609995 345766 task_exit.go:204] [ 1098: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.610008 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.610032 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.610039 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.610211 345766 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.610940 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.612901 345766 syscalls.go:262] [ 1104: 1104] Allocating stack with size of 8388608 bytes D0713 08:45:21.613113 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.614481 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.614519 345766 usertrap_amd64.go:106] [ 1104: 1104] Map a usertrap vma at 66000 D0713 08:45:21.614597 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 1 D0713 08:45:21.614617 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:21.614994 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.615010 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 2 D0713 08:45:21.615016 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:21.615551 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.615558 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 3 D0713 08:45:21.615564 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:21.620731 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.620753 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 4 D0713 08:45:21.620765 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:21.621879 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.621899 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 5 D0713 08:45:21.621905 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:21.621919 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.621922 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 6 D0713 08:45:21.621927 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:21.622274 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.622286 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 7 D0713 08:45:21.622291 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:21.622385 345766 usertrap_amd64.go:212] [ 1104: 1105] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.622400 345766 usertrap_amd64.go:122] [ 1104: 1105] Allocate a new trap: 0xc0013af2f0 8 D0713 08:45:21.622407 345766 usertrap_amd64.go:225] [ 1104: 1105] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:21.622541 345766 usertrap_amd64.go:212] [ 1104: 1105] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.622557 345766 usertrap_amd64.go:122] [ 1104: 1105] Allocate a new trap: 0xc0013af2f0 9 D0713 08:45:21.622563 345766 usertrap_amd64.go:225] [ 1104: 1105] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:21.622605 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.622627 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 10 D0713 08:45:21.622638 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:21.630327 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.630373 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 11 D0713 08:45:21.630407 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:21.632867 345766 usertrap_amd64.go:212] [ 1104: 1105] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.632911 345766 usertrap_amd64.go:122] [ 1104: 1105] Allocate a new trap: 0xc0013af2f0 12 D0713 08:45:21.632926 345766 usertrap_amd64.go:225] [ 1104: 1105] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:21.632996 345766 usertrap_amd64.go:212] [ 1104: 1105] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.633012 345766 usertrap_amd64.go:122] [ 1104: 1105] Allocate a new trap: 0xc0013af2f0 13 D0713 08:45:21.633022 345766 usertrap_amd64.go:225] [ 1104: 1105] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:21.633088 345766 task_signals.go:470] [ 1104: 1104] Notified of signal 23 D0713 08:45:21.633164 345766 task_signals.go:220] [ 1104: 1104] Signal 23: delivering to handler D0713 08:45:21.640337 345766 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.640370 345766 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc0013af2f0 14 D0713 08:45:21.640387 345766 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:21.640482 345766 task_exit.go:204] [ 1104: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.640511 345766 task_exit.go:204] [ 1104: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.640537 345766 task_signals.go:204] [ 1104: 1107] Signal 1104, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.640538 345766 task_signals.go:204] [ 1104: 1105] Signal 1104, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.640565 345766 task_signals.go:204] [ 1104: 1108] Signal 1104, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.640609 345766 task_exit.go:204] [ 1104: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.640635 345766 task_signals.go:204] [ 1104: 1106] Signal 1104, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.640653 345766 task_exit.go:204] [ 1104: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.640674 345766 task_exit.go:204] [ 1104: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.640690 345766 task_exit.go:204] [ 1104: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.640700 345766 task_exit.go:204] [ 1104: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.640705 345766 task_exit.go:204] [ 1104: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.640713 345766 task_exit.go:204] [ 1104: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.640749 345766 task_exit.go:204] [ 1104: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.640760 345766 task_exit.go:204] [ 1104: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.640770 345766 task_exit.go:204] [ 1104: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.642150 345766 task_exit.go:204] [ 1104: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.642168 345766 task_exit.go:204] [ 1104: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.642181 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.642247 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.642275 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.642376 345766 task_exit.go:204] [ 1104: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.642879 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.644497 345766 syscalls.go:262] [ 1109: 1109] Allocating stack with size of 8388608 bytes D0713 08:45:21.644620 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.645985 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.646023 345766 usertrap_amd64.go:106] [ 1109: 1109] Map a usertrap vma at 63000 D0713 08:45:21.646127 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 1 D0713 08:45:21.646160 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:21.646597 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.646616 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 2 D0713 08:45:21.646623 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:21.647333 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.647359 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 3 D0713 08:45:21.647372 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:21.653578 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.653619 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 4 D0713 08:45:21.653635 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:21.654837 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.654874 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 5 D0713 08:45:21.654890 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:21.654951 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.654969 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 6 D0713 08:45:21.654975 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:21.655381 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.655398 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 7 D0713 08:45:21.655405 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:21.655559 345766 usertrap_amd64.go:212] [ 1109: 1110] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.655576 345766 usertrap_amd64.go:122] [ 1109: 1110] Allocate a new trap: 0xc001ed3620 8 D0713 08:45:21.655584 345766 usertrap_amd64.go:225] [ 1109: 1110] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:21.655684 345766 usertrap_amd64.go:212] [ 1109: 1110] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.655712 345766 usertrap_amd64.go:122] [ 1109: 1110] Allocate a new trap: 0xc001ed3620 9 D0713 08:45:21.655726 345766 usertrap_amd64.go:225] [ 1109: 1110] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:21.655825 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.655842 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 10 D0713 08:45:21.655850 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:21.664033 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.664058 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 11 D0713 08:45:21.664068 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:21.666536 345766 usertrap_amd64.go:212] [ 1109: 1110] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.666581 345766 usertrap_amd64.go:122] [ 1109: 1110] Allocate a new trap: 0xc001ed3620 12 D0713 08:45:21.666595 345766 usertrap_amd64.go:225] [ 1109: 1110] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:21.666682 345766 usertrap_amd64.go:212] [ 1109: 1110] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.666698 345766 usertrap_amd64.go:122] [ 1109: 1110] Allocate a new trap: 0xc001ed3620 13 D0713 08:45:21.666706 345766 usertrap_amd64.go:225] [ 1109: 1110] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:21.666725 345766 task_signals.go:470] [ 1109: 1109] Notified of signal 23 D0713 08:45:21.666809 345766 task_signals.go:220] [ 1109: 1109] Signal 23: delivering to handler D0713 08:45:21.674297 345766 usertrap_amd64.go:212] [ 1109: 1109] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.674342 345766 usertrap_amd64.go:122] [ 1109: 1109] Allocate a new trap: 0xc001ed3620 14 D0713 08:45:21.674362 345766 usertrap_amd64.go:225] [ 1109: 1109] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:21.674482 345766 task_exit.go:204] [ 1109: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.674512 345766 task_exit.go:204] [ 1109: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.674542 345766 task_signals.go:204] [ 1109: 1112] Signal 1109, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.674556 345766 task_exit.go:204] [ 1109: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.674569 345766 task_exit.go:204] [ 1109: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.674574 345766 task_exit.go:204] [ 1109: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.674546 345766 task_signals.go:204] [ 1109: 1110] Signal 1109, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.674536 345766 task_signals.go:204] [ 1109: 1111] Signal 1109, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.674607 345766 task_exit.go:204] [ 1109: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.674624 345766 task_signals.go:204] [ 1109: 1113] Signal 1109, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.674634 345766 task_exit.go:204] [ 1109: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.674639 345766 task_exit.go:204] [ 1109: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.674662 345766 task_exit.go:204] [ 1109: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.674714 345766 task_exit.go:204] [ 1109: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.674729 345766 task_exit.go:204] [ 1109: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.674747 345766 task_exit.go:204] [ 1109: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.676409 345766 task_exit.go:204] [ 1109: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.676432 345766 task_exit.go:204] [ 1109: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.676455 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.676507 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.676545 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.676619 345766 task_exit.go:204] [ 1109: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.677221 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.678734 345766 syscalls.go:262] [ 1114: 1114] Allocating stack with size of 8388608 bytes D0713 08:45:21.679095 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.680771 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.680817 345766 usertrap_amd64.go:106] [ 1114: 1114] Map a usertrap vma at 69000 D0713 08:45:21.680968 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 1 D0713 08:45:21.681006 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:21.681552 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.681586 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 2 D0713 08:45:21.681596 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:21.682372 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.682395 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 3 D0713 08:45:21.682403 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:21.688560 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.688589 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 4 D0713 08:45:21.688603 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:21.689850 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.689885 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 5 D0713 08:45:21.689896 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:21.689961 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.689968 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 6 D0713 08:45:21.689974 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:21.690405 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.690423 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 7 D0713 08:45:21.690429 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:21.690574 345766 usertrap_amd64.go:212] [ 1114: 1115] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.690620 345766 usertrap_amd64.go:122] [ 1114: 1115] Allocate a new trap: 0xc0025facc0 8 D0713 08:45:21.690634 345766 usertrap_amd64.go:225] [ 1114: 1115] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:21.690893 345766 usertrap_amd64.go:212] [ 1114: 1115] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.690913 345766 usertrap_amd64.go:122] [ 1114: 1115] Allocate a new trap: 0xc0025facc0 9 D0713 08:45:21.690924 345766 usertrap_amd64.go:225] [ 1114: 1115] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:21.691117 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.691134 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 10 D0713 08:45:21.691144 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:21.691636 345766 usertrap_amd64.go:212] [ 1114: 1115] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.691663 345766 usertrap_amd64.go:122] [ 1114: 1115] Allocate a new trap: 0xc0025facc0 11 D0713 08:45:21.691725 345766 usertrap_amd64.go:225] [ 1114: 1115] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:21.691762 345766 usertrap_amd64.go:212] [ 1114: 1115] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.691770 345766 usertrap_amd64.go:122] [ 1114: 1115] Allocate a new trap: 0xc0025facc0 12 D0713 08:45:21.691780 345766 usertrap_amd64.go:225] [ 1114: 1115] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:21.691812 345766 task_signals.go:470] [ 1114: 1114] Notified of signal 23 D0713 08:45:21.691850 345766 task_signals.go:220] [ 1114: 1114] Signal 23: delivering to handler D0713 08:45:21.699036 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.699056 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 13 D0713 08:45:21.699067 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:21.702069 345766 task_signals.go:470] [ 1114: 1114] Notified of signal 23 D0713 08:45:21.702133 345766 task_signals.go:220] [ 1114: 1114] Signal 23: delivering to handler D0713 08:45:21.709906 345766 usertrap_amd64.go:212] [ 1114: 1114] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.709931 345766 usertrap_amd64.go:122] [ 1114: 1114] Allocate a new trap: 0xc0025facc0 14 D0713 08:45:21.709942 345766 usertrap_amd64.go:225] [ 1114: 1114] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:21.710003 345766 task_exit.go:204] [ 1114: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.710022 345766 task_exit.go:204] [ 1114: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.710039 345766 task_signals.go:204] [ 1114: 1118] Signal 1114, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.710061 345766 task_exit.go:204] [ 1114: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.710068 345766 task_exit.go:204] [ 1114: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.710073 345766 task_exit.go:204] [ 1114: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.710062 345766 task_signals.go:204] [ 1114: 1115] Signal 1114, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.710046 345766 task_signals.go:204] [ 1114: 1117] Signal 1114, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.710086 345766 task_signals.go:204] [ 1114: 1116] Signal 1114, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.710095 345766 task_exit.go:204] [ 1114: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.710102 345766 task_exit.go:204] [ 1114: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.710114 345766 task_exit.go:204] [ 1114: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.710122 345766 task_exit.go:204] [ 1114: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.710137 345766 task_exit.go:204] [ 1114: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.710141 345766 task_exit.go:204] [ 1114: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.710157 345766 task_exit.go:204] [ 1114: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.711848 345766 task_exit.go:204] [ 1114: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.711888 345766 task_exit.go:204] [ 1114: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.711914 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.711960 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.711982 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.712076 345766 task_exit.go:204] [ 1114: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.712718 345766 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.714258 345766 syscalls.go:262] [ 1119: 1119] Allocating stack with size of 8388608 bytes D0713 08:45:21.714383 345766 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.715669 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.715702 345766 usertrap_amd64.go:106] [ 1119: 1119] Map a usertrap vma at 60000 D0713 08:45:21.715835 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 1 D0713 08:45:21.715872 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:45:21.716208 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.716226 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 2 D0713 08:45:21.716232 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:45:21.716720 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.716746 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 3 D0713 08:45:21.716755 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:45:21.722512 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.722538 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 4 D0713 08:45:21.722549 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:45:21.723764 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.723785 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 5 D0713 08:45:21.723795 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:45:21.723854 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.723869 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 6 D0713 08:45:21.723875 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:45:21.724336 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.724360 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 7 D0713 08:45:21.724370 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:45:21.724537 345766 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.724561 345766 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc000a2f860 8 D0713 08:45:21.724568 345766 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:45:21.724770 345766 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.724793 345766 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc000a2f860 9 D0713 08:45:21.724804 345766 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:45:21.724818 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.724828 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 10 D0713 08:45:21.724837 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:45:21.725333 345766 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.725362 345766 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc000a2f860 11 D0713 08:45:21.725377 345766 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:45:21.725509 345766 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.725524 345766 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc000a2f860 12 D0713 08:45:21.725530 345766 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:45:21.725584 345766 task_signals.go:470] [ 1119: 1119] Notified of signal 23 D0713 08:45:21.725609 345766 task_signals.go:220] [ 1119: 1119] Signal 23: delivering to handler D0713 08:45:21.731629 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.731655 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 13 D0713 08:45:21.731664 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:45:21.735789 345766 task_signals.go:470] [ 1119: 1119] Notified of signal 23 D0713 08:45:21.735942 345766 task_signals.go:220] [ 1119: 1119] Signal 23: delivering to handler D0713 08:45:21.741507 345766 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.741535 345766 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc000a2f860 14 D0713 08:45:21.741547 345766 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:45:21.741608 345766 task_exit.go:204] [ 1119: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.741631 345766 task_exit.go:204] [ 1119: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.741646 345766 task_signals.go:204] [ 1119: 1122] Signal 1119, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.741656 345766 task_signals.go:204] [ 1119: 1123] Signal 1119, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.741666 345766 task_signals.go:204] [ 1119: 1121] Signal 1119, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.741674 345766 task_exit.go:204] [ 1119: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.741755 345766 task_signals.go:204] [ 1119: 1120] Signal 1119, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.741780 345766 task_exit.go:204] [ 1119: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.741790 345766 task_exit.go:204] [ 1119: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.741801 345766 task_exit.go:204] [ 1119: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.741809 345766 task_exit.go:204] [ 1119: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.741814 345766 task_exit.go:204] [ 1119: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.741824 345766 task_exit.go:204] [ 1119: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.741839 345766 task_exit.go:204] [ 1119: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.741842 345766 task_exit.go:204] [ 1119: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.741850 345766 task_exit.go:204] [ 1119: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.743513 345766 task_exit.go:204] [ 1119: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.743534 345766 task_exit.go:204] [ 1119: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.743544 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.743573 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.743590 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.743671 345766 task_exit.go:204] [ 1119: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.744253 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.745591 345766 syscalls.go:262] [ 1124: 1124] Allocating stack with size of 8388608 bytes D0713 08:45:21.745714 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.746898 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.746928 345766 usertrap_amd64.go:106] [ 1124: 1124] Map a usertrap vma at 66000 D0713 08:45:21.747002 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 1 D0713 08:45:21.747023 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:21.747287 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.747309 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 2 D0713 08:45:21.747318 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:21.747804 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.747824 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 3 D0713 08:45:21.747833 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:21.753980 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.754011 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 4 D0713 08:45:21.754023 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:21.755166 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.755189 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 5 D0713 08:45:21.755204 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:21.755318 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.755339 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 6 D0713 08:45:21.755350 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:21.755862 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.755879 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 7 D0713 08:45:21.755885 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:21.756014 345766 usertrap_amd64.go:212] [ 1124: 1125] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.756036 345766 usertrap_amd64.go:122] [ 1124: 1125] Allocate a new trap: 0xc0027bf200 8 D0713 08:45:21.756045 345766 usertrap_amd64.go:225] [ 1124: 1125] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:21.756191 345766 usertrap_amd64.go:212] [ 1124: 1125] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.756217 345766 usertrap_amd64.go:122] [ 1124: 1125] Allocate a new trap: 0xc0027bf200 9 D0713 08:45:21.756225 345766 usertrap_amd64.go:225] [ 1124: 1125] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:21.756236 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.756241 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 10 D0713 08:45:21.756252 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:21.764220 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.764244 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 11 D0713 08:45:21.764253 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:21.766730 345766 usertrap_amd64.go:212] [ 1124: 1125] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.766754 345766 usertrap_amd64.go:122] [ 1124: 1125] Allocate a new trap: 0xc0027bf200 12 D0713 08:45:21.766764 345766 usertrap_amd64.go:225] [ 1124: 1125] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:21.766829 345766 usertrap_amd64.go:212] [ 1124: 1125] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.766846 345766 usertrap_amd64.go:122] [ 1124: 1125] Allocate a new trap: 0xc0027bf200 13 D0713 08:45:21.766855 345766 usertrap_amd64.go:225] [ 1124: 1125] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:21.766906 345766 task_signals.go:470] [ 1124: 1124] Notified of signal 23 D0713 08:45:21.766972 345766 task_signals.go:220] [ 1124: 1124] Signal 23: delivering to handler D0713 08:45:21.774931 345766 usertrap_amd64.go:212] [ 1124: 1124] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.774951 345766 usertrap_amd64.go:122] [ 1124: 1124] Allocate a new trap: 0xc0027bf200 14 D0713 08:45:21.774961 345766 usertrap_amd64.go:225] [ 1124: 1124] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:21.775036 345766 task_exit.go:204] [ 1124: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.775048 345766 task_exit.go:204] [ 1124: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.775067 345766 task_signals.go:204] [ 1124: 1128] Signal 1124, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.775084 345766 task_exit.go:204] [ 1124: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.775083 345766 task_signals.go:204] [ 1124: 1127] Signal 1124, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.775091 345766 task_exit.go:204] [ 1124: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.775101 345766 task_exit.go:204] [ 1124: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.775066 345766 task_signals.go:204] [ 1124: 1126] Signal 1124, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.775120 345766 task_signals.go:204] [ 1124: 1129] Signal 1124, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.775135 345766 task_exit.go:204] [ 1124: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.775144 345766 task_signals.go:204] [ 1124: 1125] Signal 1124, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.775155 345766 task_exit.go:204] [ 1124: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.775159 345766 task_exit.go:204] [ 1124: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.775168 345766 task_exit.go:204] [ 1124: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.775174 345766 task_exit.go:204] [ 1124: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.775179 345766 task_exit.go:204] [ 1124: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.775186 345766 task_exit.go:204] [ 1124: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.775192 345766 task_exit.go:204] [ 1124: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.775197 345766 task_exit.go:204] [ 1124: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.775204 345766 task_exit.go:204] [ 1124: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.776793 345766 task_exit.go:204] [ 1124: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.776808 345766 task_exit.go:204] [ 1124: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.776818 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.776850 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.776873 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.777010 345766 task_exit.go:204] [ 1124: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.777578 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.779019 345766 syscalls.go:262] [ 1130: 1130] Allocating stack with size of 8388608 bytes D0713 08:45:21.779130 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.780737 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.780771 345766 usertrap_amd64.go:106] [ 1130: 1130] Map a usertrap vma at 66000 D0713 08:45:21.780852 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 1 D0713 08:45:21.780875 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:21.781293 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.781314 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 2 D0713 08:45:21.781322 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:21.781780 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.781797 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 3 D0713 08:45:21.781803 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:21.787217 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.787239 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 4 D0713 08:45:21.787249 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:21.788561 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.788587 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 5 D0713 08:45:21.788602 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:21.788664 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.788682 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 6 D0713 08:45:21.788692 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:21.789213 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.789222 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 7 D0713 08:45:21.789230 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:21.789331 345766 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.789346 345766 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc001ed3da0 8 D0713 08:45:21.789354 345766 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:21.789447 345766 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.789467 345766 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc001ed3da0 9 D0713 08:45:21.789479 345766 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:21.789638 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.789668 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 10 D0713 08:45:21.789722 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:21.789835 345766 usertrap_amd64.go:212] [ 1130: 1132] Found the pattern at ip 46b6e0:sysno 24 D0713 08:45:21.789859 345766 usertrap_amd64.go:122] [ 1130: 1132] Allocate a new trap: 0xc001ed3da0 11 D0713 08:45:21.789869 345766 usertrap_amd64.go:225] [ 1130: 1132] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:21.790416 345766 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.790449 345766 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc001ed3da0 12 D0713 08:45:21.790463 345766 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:21.790483 345766 usertrap_amd64.go:212] [ 1130: 1131] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.790491 345766 usertrap_amd64.go:122] [ 1130: 1131] Allocate a new trap: 0xc001ed3da0 13 D0713 08:45:21.790509 345766 usertrap_amd64.go:225] [ 1130: 1131] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:21.790528 345766 task_signals.go:470] [ 1130: 1130] Notified of signal 23 D0713 08:45:21.790591 345766 task_signals.go:220] [ 1130: 1130] Signal 23: delivering to handler D0713 08:45:21.797070 345766 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0713 08:45:21.797326 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.797352 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 14 D0713 08:45:21.797361 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46af29 trap addr 66460 ([184 37 1 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:21.801519 345766 task_signals.go:470] [ 1130: 1130] Notified of signal 23 D0713 08:45:21.801567 345766 task_signals.go:220] [ 1130: 1130] Signal 23: delivering to handler D0713 08:45:21.807834 345766 usertrap_amd64.go:212] [ 1130: 1130] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.807861 345766 usertrap_amd64.go:122] [ 1130: 1130] Allocate a new trap: 0xc001ed3da0 15 D0713 08:45:21.807870 345766 usertrap_amd64.go:225] [ 1130: 1130] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 08:45:21.808007 345766 task_exit.go:204] [ 1130: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.808023 345766 task_exit.go:204] [ 1130: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.808043 345766 task_signals.go:204] [ 1130: 1133] Signal 1130, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.808071 345766 task_signals.go:204] [ 1130: 1135] Signal 1130, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.808082 345766 task_exit.go:204] [ 1130: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.808074 345766 task_signals.go:204] [ 1130: 1132] Signal 1130, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.808061 345766 task_signals.go:204] [ 1130: 1131] Signal 1130, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.808092 345766 task_exit.go:204] [ 1130: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.808125 345766 task_exit.go:204] [ 1130: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.808152 345766 task_exit.go:204] [ 1130: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.808044 345766 task_signals.go:204] [ 1130: 1134] Signal 1130, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.808174 345766 task_exit.go:204] [ 1130: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.808203 345766 task_exit.go:204] [ 1130: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.808212 345766 task_exit.go:204] [ 1130: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.808225 345766 task_exit.go:204] [ 1130: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.808240 345766 task_exit.go:204] [ 1130: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.808244 345766 task_exit.go:204] [ 1130: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.808253 345766 task_exit.go:204] [ 1130: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.808365 345766 task_exit.go:204] [ 1130: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.808381 345766 task_exit.go:204] [ 1130: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.810041 345766 task_exit.go:204] [ 1130: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.810067 345766 task_exit.go:204] [ 1130: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.810078 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.810110 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.810139 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.810246 345766 task_exit.go:204] [ 1130: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.810671 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.811882 345766 syscalls.go:262] [ 1136: 1136] Allocating stack with size of 8388608 bytes D0713 08:45:21.811969 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.813217 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.813239 345766 usertrap_amd64.go:106] [ 1136: 1136] Map a usertrap vma at 68000 D0713 08:45:21.813339 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 1 D0713 08:45:21.813367 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:21.813879 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.813899 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 2 D0713 08:45:21.813906 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:21.814372 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.814391 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 3 D0713 08:45:21.814398 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:21.820920 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.820965 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 4 D0713 08:45:21.820994 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:21.822124 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.822155 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 5 D0713 08:45:21.822174 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:21.822228 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.822250 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 6 D0713 08:45:21.822259 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:21.822511 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.822531 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 7 D0713 08:45:21.822540 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:21.822697 345766 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.822721 345766 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc001026180 8 D0713 08:45:21.822731 345766 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:21.822941 345766 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.822969 345766 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc001026180 9 D0713 08:45:21.822979 345766 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:21.823097 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.823120 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 10 D0713 08:45:21.823129 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:21.823583 345766 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.823601 345766 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc001026180 11 D0713 08:45:21.823611 345766 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:21.823667 345766 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.823683 345766 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc001026180 12 D0713 08:45:21.823693 345766 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:21.823711 345766 task_signals.go:470] [ 1136: 1136] Notified of signal 23 D0713 08:45:21.823733 345766 task_signals.go:220] [ 1136: 1136] Signal 23: delivering to handler D0713 08:45:21.830539 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.830564 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 13 D0713 08:45:21.830573 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:21.834579 345766 task_signals.go:470] [ 1136: 1136] Notified of signal 23 D0713 08:45:21.834658 345766 task_signals.go:220] [ 1136: 1136] Signal 23: delivering to handler D0713 08:45:21.840868 345766 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.840897 345766 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc001026180 14 D0713 08:45:21.840908 345766 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:21.840989 345766 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.841012 345766 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.841034 345766 task_signals.go:204] [ 1136: 1139] Signal 1136, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.841031 345766 task_signals.go:204] [ 1136: 1138] Signal 1136, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.841069 345766 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.841076 345766 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.841081 345766 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.841067 345766 task_signals.go:204] [ 1136: 1137] Signal 1136, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.841070 345766 task_signals.go:204] [ 1136: 1140] Signal 1136, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.841088 345766 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.841119 345766 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.841151 345766 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.841174 345766 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.841184 345766 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.841190 345766 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.841200 345766 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.842877 345766 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.842908 345766 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.842918 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.842978 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.842995 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.843075 345766 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.843763 345766 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.845589 345766 syscalls.go:262] [ 1141: 1141] Allocating stack with size of 8388608 bytes D0713 08:45:21.845771 345766 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.847059 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.847099 345766 usertrap_amd64.go:106] [ 1141: 1141] Map a usertrap vma at 64000 D0713 08:45:21.847194 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 1 D0713 08:45:21.847220 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:21.847739 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.847760 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 2 D0713 08:45:21.847776 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:21.848523 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.848547 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 3 D0713 08:45:21.848558 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:21.854372 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.854402 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 4 D0713 08:45:21.854414 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:21.855711 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.855736 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 5 D0713 08:45:21.855748 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:21.855804 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.855814 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 6 D0713 08:45:21.855822 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:21.856056 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.856075 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 7 D0713 08:45:21.856081 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:21.856204 345766 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.856224 345766 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc0013af860 8 D0713 08:45:21.856235 345766 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:21.856518 345766 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.856552 345766 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc0013af860 9 D0713 08:45:21.856565 345766 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:21.856620 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.856649 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 10 D0713 08:45:21.856658 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:21.864336 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.864360 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 11 D0713 08:45:21.864370 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:21.866902 345766 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.866932 345766 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc0013af860 12 D0713 08:45:21.866946 345766 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:21.866976 345766 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.866991 345766 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc0013af860 13 D0713 08:45:21.867000 345766 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:21.867086 345766 task_signals.go:470] [ 1141: 1141] Notified of signal 23 D0713 08:45:21.867178 345766 task_signals.go:220] [ 1141: 1141] Signal 23: delivering to handler D0713 08:45:21.874834 345766 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.874860 345766 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0013af860 14 D0713 08:45:21.874871 345766 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:21.874942 345766 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.874954 345766 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.874978 345766 task_signals.go:204] [ 1141: 1144] Signal 1141, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.874995 345766 task_signals.go:204] [ 1141: 1145] Signal 1141, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.875005 345766 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.875011 345766 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.875016 345766 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.875002 345766 task_signals.go:204] [ 1141: 1143] Signal 1141, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.875032 345766 task_signals.go:204] [ 1141: 1142] Signal 1141, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.875054 345766 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.875082 345766 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.875092 345766 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.875112 345766 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.875124 345766 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.875130 345766 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.875141 345766 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.876674 345766 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.876699 345766 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.876709 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.876776 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.876820 345766 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.876821 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.877427 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.878714 345766 syscalls.go:262] [ 1146: 1146] Allocating stack with size of 8388608 bytes D0713 08:45:21.878884 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.880407 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.880456 345766 usertrap_amd64.go:106] [ 1146: 1146] Map a usertrap vma at 65000 D0713 08:45:21.880553 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 1 D0713 08:45:21.880581 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:21.881125 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.881158 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 2 D0713 08:45:21.881172 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:21.882120 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.882146 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 3 D0713 08:45:21.882159 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:21.889005 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.889032 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 4 D0713 08:45:21.889045 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:21.890191 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.890221 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 5 D0713 08:45:21.890231 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:21.890287 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.890307 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 6 D0713 08:45:21.890313 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:21.890676 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.890693 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 7 D0713 08:45:21.890700 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:21.890766 345766 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.890772 345766 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc000419b00 8 D0713 08:45:21.890779 345766 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:21.890941 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.890965 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 9 D0713 08:45:21.890975 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:21.891032 345766 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.891046 345766 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc000419b00 10 D0713 08:45:21.891053 345766 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:21.898266 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.898290 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 11 D0713 08:45:21.898300 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:21.902513 345766 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.902542 345766 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc000419b00 12 D0713 08:45:21.902551 345766 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:21.902662 345766 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.902686 345766 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc000419b00 13 D0713 08:45:21.902696 345766 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:21.902771 345766 task_signals.go:470] [ 1146: 1146] Notified of signal 23 D0713 08:45:21.902834 345766 task_signals.go:220] [ 1146: 1146] Signal 23: delivering to handler I0713 08:45:21.908611 345766 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 08:45:21.908730 345766 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.908739 345766 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000419b00 14 D0713 08:45:21.908748 345766 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:21.908810 345766 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.908829 345766 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.908846 345766 task_signals.go:204] [ 1146: 1150] Signal 1146, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.908844 345766 task_signals.go:204] [ 1146: 1149] Signal 1146, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.908859 345766 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.908870 345766 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.908877 345766 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.908908 345766 task_signals.go:204] [ 1146: 1148] Signal 1146, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.908937 345766 task_signals.go:204] [ 1146: 1152] Signal 1146, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.908932 345766 task_signals.go:204] [ 1146: 1151] Signal 1146, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.908967 345766 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.909002 345766 task_signals.go:204] [ 1146: 1147] Signal 1146, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.909032 345766 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.909042 345766 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.909056 345766 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.909070 345766 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.909076 345766 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.909088 345766 task_exit.go:204] [ 1146: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.909101 345766 task_exit.go:204] [ 1146: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.909108 345766 task_exit.go:204] [ 1146: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.909122 345766 task_exit.go:204] [ 1146: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.909131 345766 task_exit.go:204] [ 1146: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.909141 345766 task_exit.go:204] [ 1146: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.909151 345766 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.910748 345766 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.910782 345766 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.910793 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.910853 345766 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.910847 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.910870 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.911337 345766 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.912843 345766 syscalls.go:262] [ 1153: 1153] Allocating stack with size of 8388608 bytes D0713 08:45:21.912997 345766 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.914500 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.914571 345766 usertrap_amd64.go:106] [ 1153: 1153] Map a usertrap vma at 63000 D0713 08:45:21.914674 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 1 D0713 08:45:21.914708 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:45:21.915139 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.915156 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 2 D0713 08:45:21.915164 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:45:21.915738 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.915761 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 3 D0713 08:45:21.915772 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:45:21.921097 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.921126 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 4 D0713 08:45:21.921136 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:45:21.922526 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.922539 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 5 D0713 08:45:21.922547 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:45:21.922560 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.922575 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 6 D0713 08:45:21.922581 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:45:21.922853 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.922877 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 7 D0713 08:45:21.922890 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:45:21.923116 345766 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.923141 345766 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc0013afaa0 8 D0713 08:45:21.923150 345766 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:45:21.923404 345766 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.923432 345766 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc0013afaa0 9 D0713 08:45:21.923444 345766 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:45:21.923455 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.923461 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 10 D0713 08:45:21.923467 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:45:21.924023 345766 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.924039 345766 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc0013afaa0 11 D0713 08:45:21.924050 345766 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:45:21.924079 345766 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.924085 345766 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc0013afaa0 12 D0713 08:45:21.924092 345766 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:45:21.924118 345766 task_signals.go:470] [ 1153: 1153] Notified of signal 23 D0713 08:45:21.924204 345766 task_signals.go:220] [ 1153: 1153] Signal 23: delivering to handler D0713 08:45:21.930502 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.930527 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 13 D0713 08:45:21.930536 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:45:21.934509 345766 task_signals.go:470] [ 1153: 1153] Notified of signal 23 D0713 08:45:21.934560 345766 task_signals.go:179] [ 1153: 1153] Restarting syscall 202: interrupted by signal 23 D0713 08:45:21.934577 345766 task_signals.go:220] [ 1153: 1153] Signal 23: delivering to handler D0713 08:45:21.940285 345766 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.940321 345766 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc0013afaa0 14 D0713 08:45:21.940338 345766 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:45:21.940480 345766 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.940507 345766 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.940522 345766 task_signals.go:204] [ 1153: 1154] Signal 1153, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.940540 345766 task_signals.go:204] [ 1153: 1157] Signal 1153, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.940541 345766 task_signals.go:204] [ 1153: 1156] Signal 1153, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.940551 345766 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.940578 345766 task_signals.go:204] [ 1153: 1155] Signal 1153, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.940593 345766 task_signals.go:204] [ 1153: 1158] Signal 1153, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.940605 345766 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.940639 345766 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.940650 345766 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.940661 345766 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.940668 345766 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.940673 345766 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.940680 345766 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.940688 345766 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.940708 345766 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.940718 345766 task_exit.go:204] [ 1153: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.940802 345766 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.940836 345766 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.942426 345766 task_exit.go:204] [ 1153: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.942447 345766 task_exit.go:204] [ 1153: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.942455 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.942500 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.942517 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.942565 345766 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.943174 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.944571 345766 syscalls.go:262] [ 1159: 1159] Allocating stack with size of 8388608 bytes D0713 08:45:21.944664 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.946056 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.946122 345766 usertrap_amd64.go:106] [ 1159: 1159] Map a usertrap vma at 66000 D0713 08:45:21.946207 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 1 D0713 08:45:21.946241 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:21.946845 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.946897 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 2 D0713 08:45:21.946915 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:21.947706 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.947738 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 3 D0713 08:45:21.947753 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:21.954662 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.954719 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 4 D0713 08:45:21.954736 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:21.955966 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.955991 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 5 D0713 08:45:21.956001 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:21.956065 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.956091 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 6 D0713 08:45:21.956098 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:21.956597 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.956622 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 7 D0713 08:45:21.956636 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:21.956864 345766 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.956878 345766 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc001026660 8 D0713 08:45:21.956888 345766 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:21.957143 345766 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.957174 345766 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc001026660 9 D0713 08:45:21.957189 345766 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:21.957279 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.957294 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 10 D0713 08:45:21.957301 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:21.957863 345766 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b020:sysno 39 D0713 08:45:21.957889 345766 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc001026660 11 D0713 08:45:21.957903 345766 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:21.958030 345766 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:21.958047 345766 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc001026660 12 D0713 08:45:21.958056 345766 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:21.958074 345766 task_signals.go:470] [ 1159: 1159] Notified of signal 23 D0713 08:45:21.958120 345766 task_signals.go:220] [ 1159: 1159] Signal 23: delivering to handler D0713 08:45:21.964533 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.964557 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 13 D0713 08:45:21.964566 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:21.969183 345766 task_signals.go:470] [ 1159: 1159] Notified of signal 23 D0713 08:45:21.969232 345766 task_signals.go:179] [ 1159: 1159] Restarting syscall 202: interrupted by signal 23 D0713 08:45:21.969248 345766 task_signals.go:220] [ 1159: 1159] Signal 23: delivering to handler D0713 08:45:21.975885 345766 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:21.975927 345766 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001026660 14 D0713 08:45:21.975943 345766 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:21.976017 345766 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.976054 345766 task_signals.go:204] [ 1159: 1161] Signal 1159, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.976083 345766 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.976109 345766 task_signals.go:204] [ 1159: 1162] Signal 1159, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.976115 345766 task_signals.go:204] [ 1159: 1160] Signal 1159, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.976126 345766 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.976169 345766 task_signals.go:204] [ 1159: 1163] Signal 1159, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:21.976195 345766 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.976202 345766 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.976226 345766 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.976242 345766 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.976247 345766 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.976258 345766 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.976279 345766 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.976312 345766 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.976340 345766 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:21.978192 345766 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:21.978220 345766 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.978234 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:21.978261 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:21.978286 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:21.978368 345766 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:21.978416 345766 task_signals.go:470] [ 6: 8] Notified of signal 23 D0713 08:45:21.978473 345766 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0713 08:45:21.979089 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.980191 345766 syscalls.go:262] [ 1164: 1164] Allocating stack with size of 8388608 bytes D0713 08:45:21.980356 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:21.981681 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:21.981726 345766 usertrap_amd64.go:106] [ 1164: 1164] Map a usertrap vma at 65000 D0713 08:45:21.981798 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 1 D0713 08:45:21.981822 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:21.982261 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:21.982302 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 2 D0713 08:45:21.982316 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:21.982954 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:21.982977 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 3 D0713 08:45:21.982985 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:21.989052 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:21.989097 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 4 D0713 08:45:21.989115 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:21.990424 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:21.990452 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 5 D0713 08:45:21.990462 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:21.990517 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b214:sysno 13 D0713 08:45:21.990524 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 6 D0713 08:45:21.990529 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:21.990968 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:21.990997 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 7 D0713 08:45:21.991009 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:21.991192 345766 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:21.991211 345766 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc0025fb530 8 D0713 08:45:21.991225 345766 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:21.991452 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:21.991479 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 9 D0713 08:45:21.991490 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:21.991521 345766 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46af76:sysno 35 D0713 08:45:21.991541 345766 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc0025fb530 10 D0713 08:45:21.991547 345766 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:21.998612 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46af29:sysno 293 D0713 08:45:21.998642 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 11 D0713 08:45:21.998655 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:22.001691 345766 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.001716 345766 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc0025fb530 12 D0713 08:45:22.001733 345766 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:22.001856 345766 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.001890 345766 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc0025fb530 13 D0713 08:45:22.001909 345766 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:22.001975 345766 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0713 08:45:22.002066 345766 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0713 08:45:22.009990 345766 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.010064 345766 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc0025fb530 14 D0713 08:45:22.010085 345766 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:22.010194 345766 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.010236 345766 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.010272 345766 task_signals.go:204] [ 1164: 1168] Signal 1164, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.010288 345766 task_signals.go:204] [ 1164: 1167] Signal 1164, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.010301 345766 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.010294 345766 task_signals.go:204] [ 1164: 1165] Signal 1164, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.010318 345766 task_signals.go:204] [ 1164: 1166] Signal 1164, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.010340 345766 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.010349 345766 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.010362 345766 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.010371 345766 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.010377 345766 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.010388 345766 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.010395 345766 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.010422 345766 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.010435 345766 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.012088 345766 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.012110 345766 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.012119 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.012147 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.012155 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.012319 345766 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.012927 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.014343 345766 syscalls.go:262] [ 1169: 1169] Allocating stack with size of 8388608 bytes D0713 08:45:22.014499 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.016160 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.016195 345766 usertrap_amd64.go:106] [ 1169: 1169] Map a usertrap vma at 61000 D0713 08:45:22.016263 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 1 D0713 08:45:22.016288 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:22.016583 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.016601 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 2 D0713 08:45:22.016609 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:22.017205 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.017237 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 3 D0713 08:45:22.017247 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:22.023361 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.023400 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 4 D0713 08:45:22.023413 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:22.024574 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.024600 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 5 D0713 08:45:22.024610 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:22.024684 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.024690 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 6 D0713 08:45:22.024697 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:22.025151 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.025175 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 7 D0713 08:45:22.025183 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:22.025344 345766 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.025374 345766 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0013afc80 8 D0713 08:45:22.025388 345766 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:22.025583 345766 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.025602 345766 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0013afc80 9 D0713 08:45:22.025609 345766 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:22.025736 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.025757 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 10 D0713 08:45:22.025769 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:22.025944 345766 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.025960 345766 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0013afc80 11 D0713 08:45:22.025972 345766 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:22.026078 345766 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.026105 345766 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc0013afc80 12 D0713 08:45:22.026119 345766 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:22.026151 345766 task_signals.go:470] [ 1169: 1172] Notified of signal 23 D0713 08:45:22.026181 345766 task_signals.go:179] [ 1169: 1172] Restarting syscall 202: interrupted by signal 23 D0713 08:45:22.026189 345766 task_signals.go:220] [ 1169: 1172] Signal 23: delivering to handler D0713 08:45:22.026310 345766 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 08:45:22.026350 345766 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 08:45:22.033309 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.033343 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 13 D0713 08:45:22.033358 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:22.037167 345766 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 08:45:22.037216 345766 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 08:45:22.043919 345766 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.043946 345766 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc0013afc80 14 D0713 08:45:22.043959 345766 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:22.044087 345766 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.044132 345766 task_signals.go:204] [ 1169: 1170] Signal 1169, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.044147 345766 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.044174 345766 task_signals.go:204] [ 1169: 1171] Signal 1169, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.044190 345766 task_signals.go:204] [ 1169: 1173] Signal 1169, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.044220 345766 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.044261 345766 task_signals.go:204] [ 1169: 1172] Signal 1169, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.044284 345766 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.044299 345766 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.044314 345766 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.044331 345766 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.044337 345766 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.044353 345766 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.044364 345766 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.044370 345766 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.044386 345766 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.045948 345766 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.045974 345766 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.045999 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.046030 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.046038 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.046244 345766 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.046883 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.048601 345766 syscalls.go:262] [ 1174: 1174] Allocating stack with size of 8388608 bytes D0713 08:45:22.048729 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.050164 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.050236 345766 usertrap_amd64.go:106] [ 1174: 1174] Map a usertrap vma at 64000 D0713 08:45:22.050375 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 1 D0713 08:45:22.050431 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:22.050819 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.050840 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 2 D0713 08:45:22.050849 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:22.051372 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.051392 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 3 D0713 08:45:22.051400 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:22.056448 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.056471 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 4 D0713 08:45:22.056483 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:22.057702 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.057723 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 5 D0713 08:45:22.057734 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:22.057809 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.057817 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 6 D0713 08:45:22.057826 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:22.058300 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.058323 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 7 D0713 08:45:22.058333 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:22.058499 345766 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.058524 345766 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc001fba2d0 8 D0713 08:45:22.058532 345766 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:22.058800 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.058820 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 9 D0713 08:45:22.058827 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:22.058836 345766 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.058840 345766 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc001fba2d0 10 D0713 08:45:22.058847 345766 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:22.065945 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.065968 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 11 D0713 08:45:22.065977 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:22.069174 345766 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.069203 345766 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc001fba2d0 12 D0713 08:45:22.069216 345766 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:22.069282 345766 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.069296 345766 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc001fba2d0 13 D0713 08:45:22.069305 345766 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:22.069359 345766 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 08:45:22.069438 345766 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 08:45:22.075645 345766 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.075664 345766 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc001fba2d0 14 D0713 08:45:22.075672 345766 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:22.075701 345766 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.075734 345766 task_signals.go:204] [ 1174: 1176] Signal 1174, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.075732 345766 task_signals.go:204] [ 1174: 1175] Signal 1174, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.075748 345766 task_signals.go:204] [ 1174: 1178] Signal 1174, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.075760 345766 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.075773 345766 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.075811 345766 task_signals.go:204] [ 1174: 1177] Signal 1174, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.075830 345766 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.075837 345766 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.075849 345766 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.075864 345766 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.075868 345766 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.075876 345766 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.075890 345766 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.075906 345766 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.075916 345766 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.077163 345766 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.077182 345766 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.077193 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.077227 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.077246 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.077344 345766 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.077986 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.079128 345766 syscalls.go:262] [ 1179: 1179] Allocating stack with size of 8388608 bytes D0713 08:45:22.079219 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.080707 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.080739 345766 usertrap_amd64.go:106] [ 1179: 1179] Map a usertrap vma at 68000 D0713 08:45:22.080832 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 1 D0713 08:45:22.080860 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:45:22.081326 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.081391 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 2 D0713 08:45:22.081408 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:45:22.081904 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.081926 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 3 D0713 08:45:22.081935 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:45:22.087838 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.087866 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 4 D0713 08:45:22.087879 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:45:22.088963 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.088986 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 5 D0713 08:45:22.088997 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:45:22.089047 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.089053 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 6 D0713 08:45:22.089058 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:45:22.089209 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.089225 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 7 D0713 08:45:22.089231 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:45:22.089357 345766 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.089379 345766 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc000a7c000 8 D0713 08:45:22.089388 345766 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:45:22.089578 345766 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.089598 345766 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc000a7c000 9 D0713 08:45:22.089606 345766 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:45:22.089856 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.089877 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 10 D0713 08:45:22.089885 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:45:22.097154 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.097182 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 11 D0713 08:45:22.097190 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:45:22.100021 345766 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.100035 345766 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc000a7c000 12 D0713 08:45:22.100044 345766 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:45:22.100119 345766 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.100171 345766 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc000a7c000 13 D0713 08:45:22.100188 345766 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:45:22.100246 345766 task_signals.go:470] [ 1179: 1179] Notified of signal 23 D0713 08:45:22.100324 345766 task_signals.go:220] [ 1179: 1179] Signal 23: delivering to handler D0713 08:45:22.107241 345766 sys_signal.go:495] [ 1179: 1179] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 08:45:22.107308 345766 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.107319 345766 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc000a7c000 14 D0713 08:45:22.107331 345766 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:45:22.107382 345766 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.107411 345766 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.107437 345766 task_signals.go:204] [ 1179: 1181] Signal 1179, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.107470 345766 task_signals.go:204] [ 1179: 1183] Signal 1179, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.107480 345766 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.107460 345766 task_signals.go:204] [ 1179: 1182] Signal 1179, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.107498 345766 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.107519 345766 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.107527 345766 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.107557 345766 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.107589 345766 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.107558 345766 task_signals.go:204] [ 1179: 1180] Signal 1179, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.107594 345766 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.107635 345766 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.107649 345766 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.107659 345766 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.108824 345766 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.108846 345766 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.108874 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.108900 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.108909 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.109070 345766 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.109620 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.111103 345766 syscalls.go:262] [ 1184: 1184] Allocating stack with size of 8388608 bytes D0713 08:45:22.111222 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.112506 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.112536 345766 usertrap_amd64.go:106] [ 1184: 1184] Map a usertrap vma at 66000 D0713 08:45:22.112642 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 1 D0713 08:45:22.112665 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:45:22.113175 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.113197 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 2 D0713 08:45:22.113206 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:45:22.113765 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.113783 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 3 D0713 08:45:22.113793 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:45:22.119035 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.119070 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 4 D0713 08:45:22.119084 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:45:22.120138 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.120165 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 5 D0713 08:45:22.120175 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:45:22.120240 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.120258 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 6 D0713 08:45:22.120264 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:45:22.120486 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.120505 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 7 D0713 08:45:22.120513 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:45:22.120650 345766 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.120672 345766 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc0027bfad0 8 D0713 08:45:22.120683 345766 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:45:22.120841 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.120866 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 9 D0713 08:45:22.120878 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:45:22.120891 345766 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.120898 345766 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc0027bfad0 10 D0713 08:45:22.120906 345766 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:45:22.127552 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.127578 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 11 D0713 08:45:22.127588 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:45:22.131399 345766 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.131439 345766 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc0027bfad0 12 D0713 08:45:22.131454 345766 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:45:22.131504 345766 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.131521 345766 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc0027bfad0 13 D0713 08:45:22.131532 345766 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:45:22.131555 345766 task_signals.go:470] [ 1184: 1184] Notified of signal 23 D0713 08:45:22.131632 345766 task_signals.go:220] [ 1184: 1184] Signal 23: delivering to handler D0713 08:45:22.137006 345766 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.137028 345766 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc0027bfad0 14 D0713 08:45:22.137039 345766 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:45:22.137112 345766 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.137129 345766 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.137142 345766 task_signals.go:204] [ 1184: 1185] Signal 1184, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.137161 345766 task_signals.go:204] [ 1184: 1186] Signal 1184, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.137171 345766 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.137153 345766 task_signals.go:204] [ 1184: 1187] Signal 1184, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.137195 345766 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.137202 345766 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.137187 345766 task_signals.go:204] [ 1184: 1188] Signal 1184, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.137212 345766 task_signals.go:204] [ 1184: 1189] Signal 1184, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.137232 345766 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.137252 345766 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.137256 345766 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.137264 345766 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.137271 345766 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.137275 345766 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.137284 345766 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.137296 345766 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.137300 345766 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.137312 345766 task_exit.go:204] [ 1184: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.138481 345766 task_exit.go:204] [ 1184: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.138502 345766 task_exit.go:204] [ 1184: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.138512 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.138707 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.138749 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.138886 345766 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.139593 345766 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.141494 345766 syscalls.go:262] [ 1190: 1190] Allocating stack with size of 8388608 bytes D0713 08:45:22.141768 345766 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.142599 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.142635 345766 usertrap_amd64.go:106] [ 1190: 1190] Map a usertrap vma at 61000 D0713 08:45:22.142686 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 1 D0713 08:45:22.142712 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:22.143020 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.143037 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 2 D0713 08:45:22.143044 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:22.143494 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.143512 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 3 D0713 08:45:22.143518 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:22.149329 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.149355 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 4 D0713 08:45:22.149365 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:22.150566 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.150590 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 5 D0713 08:45:22.150599 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:22.150667 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.150677 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 6 D0713 08:45:22.150683 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:22.151150 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.151179 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 7 D0713 08:45:22.151192 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:22.151346 345766 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.151362 345766 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc0025fb770 8 D0713 08:45:22.151374 345766 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:22.151599 345766 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.151622 345766 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc0025fb770 9 D0713 08:45:22.151638 345766 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:22.151700 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.151715 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 10 D0713 08:45:22.151726 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:22.158724 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.158746 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 11 D0713 08:45:22.158756 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:22.162610 345766 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.162643 345766 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc0025fb770 12 D0713 08:45:22.162659 345766 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:22.162682 345766 usertrap_amd64.go:212] [ 1190: 1191] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.162689 345766 usertrap_amd64.go:122] [ 1190: 1191] Allocate a new trap: 0xc0025fb770 13 D0713 08:45:22.162697 345766 usertrap_amd64.go:225] [ 1190: 1191] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:22.162741 345766 task_signals.go:470] [ 1190: 1190] Notified of signal 23 D0713 08:45:22.162786 345766 task_signals.go:179] [ 1190: 1190] Restarting syscall 202: interrupted by signal 23 D0713 08:45:22.162795 345766 task_signals.go:220] [ 1190: 1190] Signal 23: delivering to handler D0713 08:45:22.168668 345766 usertrap_amd64.go:212] [ 1190: 1190] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.168720 345766 usertrap_amd64.go:122] [ 1190: 1190] Allocate a new trap: 0xc0025fb770 14 D0713 08:45:22.168740 345766 usertrap_amd64.go:225] [ 1190: 1190] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:22.168843 345766 task_exit.go:204] [ 1190: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.168873 345766 task_exit.go:204] [ 1190: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.168889 345766 task_signals.go:204] [ 1190: 1191] Signal 1190, PID: 1191, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.168905 345766 task_signals.go:204] [ 1190: 1193] Signal 1190, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.168920 345766 task_exit.go:204] [ 1190: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.168959 345766 task_signals.go:204] [ 1190: 1195] Signal 1190, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.168974 345766 task_signals.go:204] [ 1190: 1194] Signal 1190, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.169034 345766 task_signals.go:204] [ 1190: 1192] Signal 1190, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.169057 345766 task_exit.go:204] [ 1190: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.169065 345766 task_exit.go:204] [ 1190: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.169076 345766 task_exit.go:204] [ 1190: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.169112 345766 task_exit.go:204] [ 1190: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.169121 345766 task_exit.go:204] [ 1190: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.169136 345766 task_exit.go:204] [ 1190: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.169152 345766 task_exit.go:204] [ 1190: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.169167 345766 task_exit.go:204] [ 1190: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.169176 345766 task_exit.go:204] [ 1190: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.169198 345766 task_exit.go:204] [ 1190: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.169209 345766 task_exit.go:204] [ 1190: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.169225 345766 task_exit.go:204] [ 1190: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.170409 345766 task_exit.go:204] [ 1190: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.170433 345766 task_exit.go:204] [ 1190: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.170450 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.170476 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.170499 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.170554 345766 task_exit.go:204] [ 1190: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.170954 345766 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 08:45:22.171061 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.172487 345766 syscalls.go:262] [ 1196: 1196] Allocating stack with size of 8388608 bytes D0713 08:45:22.172721 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.172886 345766 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 08:45:22.174388 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.174433 345766 usertrap_amd64.go:106] [ 1196: 1196] Map a usertrap vma at 65000 D0713 08:45:22.174557 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 1 D0713 08:45:22.174588 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:45:22.175120 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.175142 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 2 D0713 08:45:22.175152 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:45:22.175885 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.175916 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 3 D0713 08:45:22.175927 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:45:22.181764 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.181790 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 4 D0713 08:45:22.181803 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:45:22.183032 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.183059 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 5 D0713 08:45:22.183070 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:45:22.183116 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.183135 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 6 D0713 08:45:22.183141 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:45:22.183456 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.183480 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 7 D0713 08:45:22.183492 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:45:22.183695 345766 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.183719 345766 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc001026f30 8 D0713 08:45:22.183731 345766 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:45:22.183910 345766 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.183934 345766 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc001026f30 9 D0713 08:45:22.183943 345766 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:45:22.183953 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.183959 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 10 D0713 08:45:22.183965 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:45:22.192333 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.192362 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 11 D0713 08:45:22.192377 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:45:22.194935 345766 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.194968 345766 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc001026f30 12 D0713 08:45:22.194990 345766 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:45:22.195031 345766 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.195058 345766 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc001026f30 13 D0713 08:45:22.195068 345766 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:45:22.195122 345766 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 08:45:22.195217 345766 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 08:45:22.203242 345766 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.203265 345766 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc001026f30 14 D0713 08:45:22.203277 345766 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:45:22.203351 345766 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.203379 345766 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.203401 345766 task_signals.go:204] [ 1196: 1199] Signal 1196, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.203395 345766 task_signals.go:204] [ 1196: 1198] Signal 1196, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.203411 345766 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.203417 345766 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.203435 345766 task_signals.go:204] [ 1196: 1200] Signal 1196, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.203451 345766 task_signals.go:204] [ 1196: 1197] Signal 1196, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.203470 345766 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.203474 345766 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.203513 345766 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.203614 345766 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.203667 345766 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.203685 345766 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.203689 345766 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.203699 345766 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.205268 345766 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.205295 345766 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.205308 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.205878 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.205938 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.205951 345766 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.206769 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.208325 345766 syscalls.go:262] [ 1201: 1201] Allocating stack with size of 8388608 bytes D0713 08:45:22.208471 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.209874 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.209961 345766 usertrap_amd64.go:106] [ 1201: 1201] Map a usertrap vma at 69000 D0713 08:45:22.210106 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 1 D0713 08:45:22.210155 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:45:22.210679 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.210708 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 2 D0713 08:45:22.210728 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:45:22.211415 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.211436 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 3 D0713 08:45:22.211445 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:45:22.218125 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.218172 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 4 D0713 08:45:22.218186 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:45:22.219682 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.219720 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 5 D0713 08:45:22.219777 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:45:22.219866 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.219887 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 6 D0713 08:45:22.219899 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:45:22.220184 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.220203 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 7 D0713 08:45:22.220212 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:45:22.220362 345766 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.220377 345766 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0004b0450 8 D0713 08:45:22.220384 345766 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:45:22.220578 345766 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.220606 345766 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0004b0450 9 D0713 08:45:22.220622 345766 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:45:22.220734 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.220755 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 10 D0713 08:45:22.220764 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:45:22.220879 345766 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.220918 345766 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0004b0450 11 D0713 08:45:22.220934 345766 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:45:22.221042 345766 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.221132 345766 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0004b0450 12 D0713 08:45:22.221159 345766 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:45:22.221197 345766 task_signals.go:470] [ 1201: 1204] Notified of signal 23 D0713 08:45:22.221263 345766 task_signals.go:179] [ 1201: 1204] Restarting syscall 202: interrupted by signal 23 D0713 08:45:22.221286 345766 task_signals.go:220] [ 1201: 1204] Signal 23: delivering to handler D0713 08:45:22.228974 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.228997 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 13 D0713 08:45:22.229005 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:45:22.231415 345766 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 08:45:22.231538 345766 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 08:45:22.239765 345766 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.239808 345766 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0004b0450 14 D0713 08:45:22.239830 345766 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:45:22.239902 345766 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.239930 345766 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.239951 345766 task_signals.go:204] [ 1201: 1202] Signal 1201, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.239966 345766 task_signals.go:204] [ 1201: 1204] Signal 1201, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.239975 345766 task_signals.go:204] [ 1201: 1203] Signal 1201, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.239983 345766 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.240005 345766 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.240016 345766 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.239960 345766 task_signals.go:204] [ 1201: 1205] Signal 1201, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.240035 345766 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.240041 345766 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.240051 345766 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.240059 345766 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.240092 345766 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.240098 345766 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.240111 345766 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.241308 345766 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.241326 345766 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.241336 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.241388 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.241394 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.241625 345766 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.242435 345766 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.243724 345766 syscalls.go:262] [ 1206: 1206] Allocating stack with size of 8388608 bytes D0713 08:45:22.243881 345766 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.245244 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.245323 345766 usertrap_amd64.go:106] [ 1206: 1206] Map a usertrap vma at 61000 D0713 08:45:22.245446 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 1 D0713 08:45:22.245487 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:45:22.246045 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.246085 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 2 D0713 08:45:22.246101 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:45:22.246992 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.247015 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 3 D0713 08:45:22.247024 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:45:22.252635 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.252658 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 4 D0713 08:45:22.252673 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:45:22.254048 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.254071 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 5 D0713 08:45:22.254081 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:45:22.254130 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.254140 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 6 D0713 08:45:22.254146 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:45:22.254331 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.254345 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 7 D0713 08:45:22.254352 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:45:22.254450 345766 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.254464 345766 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0025fb980 8 D0713 08:45:22.254470 345766 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:45:22.254638 345766 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.254659 345766 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0025fb980 9 D0713 08:45:22.254668 345766 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:45:22.254859 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.254906 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 10 D0713 08:45:22.254926 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:45:22.262468 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.262491 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 11 D0713 08:45:22.262500 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:45:22.265263 345766 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.265302 345766 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0025fb980 12 D0713 08:45:22.265320 345766 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:45:22.265442 345766 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.265469 345766 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0025fb980 13 D0713 08:45:22.265484 345766 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:45:22.265541 345766 task_signals.go:470] [ 1206: 1206] Notified of signal 23 D0713 08:45:22.265641 345766 task_signals.go:220] [ 1206: 1206] Signal 23: delivering to handler D0713 08:45:22.274968 345766 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.274997 345766 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0025fb980 14 D0713 08:45:22.275010 345766 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:45:22.275068 345766 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.275087 345766 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.275110 345766 task_signals.go:204] [ 1206: 1209] Signal 1206, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.275128 345766 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.275126 345766 task_signals.go:204] [ 1206: 1207] Signal 1206, PID: 1207, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.275137 345766 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.275144 345766 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.275103 345766 task_signals.go:204] [ 1206: 1208] Signal 1206, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.275175 345766 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.275186 345766 task_signals.go:204] [ 1206: 1210] Signal 1206, PID: 1210, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.275229 345766 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.275240 345766 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.275247 345766 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.275263 345766 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.275269 345766 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.275281 345766 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.276632 345766 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.276655 345766 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.276675 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.276698 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.276719 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.276793 345766 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.277489 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.279167 345766 syscalls.go:262] [ 1211: 1211] Allocating stack with size of 8388608 bytes D0713 08:45:22.279301 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.280504 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.280545 345766 usertrap_amd64.go:106] [ 1211: 1211] Map a usertrap vma at 64000 D0713 08:45:22.280902 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 1 D0713 08:45:22.280962 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:45:22.281539 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.281557 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 2 D0713 08:45:22.281580 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:45:22.282280 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.282303 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 3 D0713 08:45:22.282309 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:45:22.288636 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.288664 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 4 D0713 08:45:22.288675 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:45:22.289909 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.289934 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 5 D0713 08:45:22.289945 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:45:22.289996 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.290011 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 6 D0713 08:45:22.290018 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:45:22.290181 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.290197 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 7 D0713 08:45:22.290203 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:45:22.290299 345766 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.290321 345766 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc0025fbb30 8 D0713 08:45:22.290329 345766 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:45:22.290595 345766 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.290623 345766 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc0025fbb30 9 D0713 08:45:22.290633 345766 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:45:22.290741 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.290761 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 10 D0713 08:45:22.290769 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:45:22.298410 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.298438 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 11 D0713 08:45:22.298452 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:45:22.301155 345766 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.301173 345766 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc0025fbb30 12 D0713 08:45:22.301181 345766 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:45:22.301221 345766 usertrap_amd64.go:212] [ 1211: 1212] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.301250 345766 usertrap_amd64.go:122] [ 1211: 1212] Allocate a new trap: 0xc0025fbb30 13 D0713 08:45:22.301263 345766 usertrap_amd64.go:225] [ 1211: 1212] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:45:22.301351 345766 task_signals.go:470] [ 1211: 1211] Notified of signal 23 D0713 08:45:22.301471 345766 task_signals.go:220] [ 1211: 1211] Signal 23: delivering to handler D0713 08:45:22.309660 345766 usertrap_amd64.go:212] [ 1211: 1211] Found the pattern at ip 46ae44:sysno 231 D0713 08:45:22.309688 345766 usertrap_amd64.go:122] [ 1211: 1211] Allocate a new trap: 0xc0025fbb30 14 D0713 08:45:22.309698 345766 usertrap_amd64.go:225] [ 1211: 1211] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:45:22.309759 345766 task_exit.go:204] [ 1211: 1211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.309778 345766 task_exit.go:204] [ 1211: 1211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.309800 345766 task_signals.go:204] [ 1211: 1214] Signal 1211, PID: 1214, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.309821 345766 task_exit.go:204] [ 1211: 1214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.309795 345766 task_signals.go:204] [ 1211: 1213] Signal 1211, PID: 1213, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.309829 345766 task_exit.go:204] [ 1211: 1214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.309822 345766 task_signals.go:204] [ 1211: 1212] Signal 1211, PID: 1212, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.309836 345766 task_exit.go:204] [ 1211: 1214] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.309862 345766 task_signals.go:204] [ 1211: 1215] Signal 1211, PID: 1215, TID: 0, fault addr: 0x9: terminating thread group D0713 08:45:22.309872 345766 task_exit.go:204] [ 1211: 1213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.309905 345766 task_exit.go:204] [ 1211: 1213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.309914 345766 task_exit.go:204] [ 1211: 1213] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.309928 345766 task_exit.go:204] [ 1211: 1212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.309933 345766 task_exit.go:204] [ 1211: 1212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.309939 345766 task_exit.go:204] [ 1211: 1212] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.309957 345766 task_exit.go:204] [ 1211: 1215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:45:22.311349 345766 task_exit.go:204] [ 1211: 1215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:45:22.311377 345766 task_exit.go:204] [ 1211: 1215] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.311427 345766 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 08:45:22.311453 345766 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 08:45:22.311465 345766 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 08:45:22.311523 345766 task_exit.go:204] [ 1211: 1211] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:45:22.312283 345766 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.313701 345766 syscalls.go:262] [ 1216: 1216] Allocating stack with size of 8388608 bytes D0713 08:45:22.313779 345766 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:45:22.315360 345766 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b70f:sysno 204 D0713 08:45:22.315387 345766 usertrap_amd64.go:106] [ 1216: 1216] Map a usertrap vma at 67000 D0713 08:45:22.315493 345766 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc001fbac90 1 D0713 08:45:22.315520 345766 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:45:22.315975 345766 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46ae93:sysno 257 D0713 08:45:22.316002 345766 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc001fbac90 2 D0713 08:45:22.316011 345766 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:45:22.316844 345766 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b41d:sysno 9 D0713 08:45:22.316888 345766 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc001fbac90 3 D0713 08:45:22.316907 345766 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:45:22.323019 345766 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b1d3:sysno 14 D0713 08:45:22.323044 345766 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc001fbac90 4 D0713 08:45:22.323054 345766 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:45:22.324272 345766 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46afa0:sysno 186 D0713 08:45:22.324293 345766 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc001fbac90 5 D0713 08:45:22.324306 345766 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:45:22.324364 345766 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b214:sysno 13 D0713 08:45:22.324384 345766 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc001fbac90 6 D0713 08:45:22.324393 345766 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:45:22.324633 345766 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b5eb:sysno 56 D0713 08:45:22.324647 345766 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc001fbac90 7 D0713 08:45:22.324683 345766 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:45:22.324880 345766 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46b60c:sysno 186 D0713 08:45:22.324895 345766 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc001fbac90 8 D0713 08:45:22.324901 345766 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:45:22.325187 345766 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46b57c:sysno 202 D0713 08:45:22.325206 345766 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc001fbac90 9 D0713 08:45:22.325216 345766 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:45:22.325312 345766 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46af76:sysno 35 D0713 08:45:22.325348 345766 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc001fbac90 10 D0713 08:45:22.325361 345766 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:45:22.333184 345766 usertrap_amd64.go:212] [ 1216: 1216] Found the pattern at ip 46af29:sysno 293 D0713 08:45:22.333242 345766 usertrap_amd64.go:122] [ 1216: 1216] Allocate a new trap: 0xc001fbac90 11 D0713 08:45:22.333256 345766 usertrap_amd64.go:225] [ 1216: 1216] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:45:22.336183 345766 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46b020:sysno 39 D0713 08:45:22.336222 345766 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc001fbac90 12 D0713 08:45:22.336235 345766 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:45:22.336311 345766 usertrap_amd64.go:212] [ 1216: 1217] Found the pattern at ip 46b04f:sysno 234 D0713 08:45:22.336347 345766 usertrap_amd64.go:122] [ 1216: 1217] Allocate a new trap: 0xc001fbac90 13 D0713 08:45:22.336359 345766 usertrap_amd64.go:225] [ 1216: 1217] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:45:22.336431 345766 task_signals.go:470] [ 1216: 1216] Notified of signal 23 D0713 08:45:22.336525 345766 task_signals.go:220] [ 1216: 1216] Signal 23: delivering to handler D0713 08:45:22.345669 345766 task_signals.go:309] [ 1216: 1216] failed to restore from a signal frame: bad address D0713 08:45:22.345721 345766 task_signals.go:470] [ 1216: 1216] Notified of signal 11 D0713 08:45:22.345738 345766 task_signals.go:220] [ 1216: 1216] Signal 11: delivering to handler W0713 08:45:22.366491 345868 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-test-1": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-test-1": urpc method "containerManager.WaitPID" failed: EOF W0713 08:45:22.366677 345868 main.go:274] Failure to execute command, err: 1 W0713 08:45:22.378144 345742 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-test-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0713 08:45:22.378141 1 connection.go:127] sock read failed, closing connection: EOF D0713 08:45:22.378299 345742 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-test-1 D0713 08:45:22.378367 345742 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-test-1 I0713 08:45:22.378356 1 gofer.go:319] All lisafs servers exited. D0713 08:45:22.378382 345742 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-test-1 D0713 08:45:22.378390 345742 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-test-1" I0713 08:45:22.378399 1 main.go:265] Exiting with status: 0 D0713 08:45:22.378470 345742 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-test-1, PID: 345755 D0713 08:45:22.382403 345742 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-test-1" D0713 08:45:22.382455 345742 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382533 345742 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382546 345742 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382554 345742 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382568 345742 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382577 345742 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382585 345742 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382613 345742 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382635 345742 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382959 345742 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382984 345742 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-test-1" D0713 08:45:22.382992 345742 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-test-1" D0713 08:45:22.383004 345742 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-test-1" I0713 08:45:22.383812 345742 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 08:45:22.401477 346791 main.go:230] *************************** I0713 08:45:22.401513 346791 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-1] I0713 08:45:22.401544 346791 main.go:232] Version 0.0.0 I0713 08:45:22.401556 346791 main.go:233] GOOS: linux I0713 08:45:22.401578 346791 main.go:234] GOARCH: amd64 I0713 08:45:22.401590 346791 main.go:235] PID: 346791 I0713 08:45:22.401610 346791 main.go:236] UID: 0, GID: 0 I0713 08:45:22.401628 346791 main.go:237] Configuration: I0713 08:45:22.401647 346791 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0713 08:45:22.401659 346791 main.go:239] Platform: systrap I0713 08:45:22.401671 346791 main.go:240] FileAccess: shared I0713 08:45:22.401684 346791 main.go:241] Directfs: true I0713 08:45:22.401697 346791 main.go:242] Overlay: none I0713 08:45:22.401718 346791 main.go:243] Network: sandbox, logging: false I0713 08:45:22.401743 346791 main.go:244] Strace: false, max size: 1024, syscalls: I0713 08:45:22.401761 346791 main.go:245] IOURING: false I0713 08:45:22.401782 346791 main.go:246] Debug: true I0713 08:45:22.401794 346791 main.go:247] Systemd: false I0713 08:45:22.401805 346791 main.go:248] *************************** D0713 08:45:22.401844 346791 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 08:45:22.401958 346791 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-1": file does not exist loading container "ci-gvisor-systrap-1-test-1": file does not exist W0713 08:45:22.402103 346791 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-test-1"]: exit status 128 I0713 08:45:22.401477 346791 main.go:230] *************************** I0713 08:45:22.401513 346791 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-1] I0713 08:45:22.401544 346791 main.go:232] Version 0.0.0 I0713 08:45:22.401556 346791 main.go:233] GOOS: linux I0713 08:45:22.401578 346791 main.go:234] GOARCH: amd64 I0713 08:45:22.401590 346791 main.go:235] PID: 346791 I0713 08:45:22.401610 346791 main.go:236] UID: 0, GID: 0 I0713 08:45:22.401628 346791 main.go:237] Configuration: I0713 08:45:22.401647 346791 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0713 08:45:22.401659 346791 main.go:239] Platform: systrap I0713 08:45:22.401671 346791 main.go:240] FileAccess: shared I0713 08:45:22.401684 346791 main.go:241] Directfs: true I0713 08:45:22.401697 346791 main.go:242] Overlay: none I0713 08:45:22.401718 346791 main.go:243] Network: sandbox, logging: false I0713 08:45:22.401743 346791 main.go:244] Strace: false, max size: 1024, syscalls: I0713 08:45:22.401761 346791 main.go:245] IOURING: false I0713 08:45:22.401782 346791 main.go:246] Debug: true I0713 08:45:22.401794 346791 main.go:247] Systemd: false I0713 08:45:22.401805 346791 main.go:248] *************************** D0713 08:45:22.401844 346791 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 08:45:22.401958 346791 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-1": file does not exist loading container "ci-gvisor-systrap-1-test-1": file does not exist W0713 08:45:22.402103 346791 main.go:274] Failure to execute command, err: 1 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603138.090907] audit: type=1326 audit(1689206885.302:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603172.298141] audit: type=1326 audit(1689206919.510:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603182.461434] audit: type=1326 audit(1689206929.674:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780255 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603243.896847] audit: type=1326 audit(1689206991.106:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603279.127507] audit: type=1326 audit(1689207026.338:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=787634 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603309.589653] audit: type=1326 audit(1689207056.802:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603335.471219] audit: type=1326 audit(1689207082.682:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=788938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603343.797267] audit: type=1326 audit(1689207091.010:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=790140 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603405.836680] audit: type=1326 audit(1689207153.046:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792319 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603420.441739] audit: type=1326 audit(1689207167.654:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603427.753376] audit: type=1326 audit(1689207174.966:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774364 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603505.176389] audit: type=1326 audit(1689207252.385:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796183 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603533.829677] audit: type=1326 audit(1689207281.041:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=797063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603562.278422] audit: type=1326 audit(1689207309.489:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603667.052521] audit: type=1326 audit(1689207414.261:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=805774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603667.905373] audit: type=1326 audit(1689207415.113:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807621 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603676.505802] audit: type=1326 audit(1689207423.717:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603684.820900] audit: type=1326 audit(1689207432.029:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=793728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603795.965747] audit: type=1326 audit(1689207543.177:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=812556 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603804.637990] audit: type=1326 audit(1689207551.849:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603810.551130] audit: type=1326 audit(1689207557.761:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603820.309874] audit: type=1326 audit(1689207567.521:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=811185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603836.504336] audit: type=1326 audit(1689207583.713:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=800972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603841.793876] audit: type=1326 audit(1689207589.005:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603870.199020] audit: type=1326 audit(1689207617.409:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603951.796356] audit: type=1326 audit(1689207699.005:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=816857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603957.195581] audit: type=1326 audit(1689207704.405:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817252 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603991.129069] audit: type=1326 audit(1689207738.337:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604091.585729] audit: type=1326 audit(1689207838.793:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604093.722432] audit: type=1326 audit(1689207840.933:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604119.143756] audit: type=1326 audit(1689207866.353:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=822836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604204.469045] audit: type=1326 audit(1689207951.676:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604217.655924] audit: type=1326 audit(1689207964.864:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604224.651590] audit: type=1326 audit(1689207971.860:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604234.352201] audit: type=1326 audit(1689207981.564:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604235.997704] audit: type=1326 audit(1689207983.208:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604256.614441] audit: type=1326 audit(1689208003.828:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604263.313503] audit: type=1326 audit(1689208010.524:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604308.646673] audit: type=1326 audit(1689208055.860:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831393 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604427.403379] audit: type=1326 audit(1689208174.616:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=833669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604450.026228] audit: type=1326 audit(1689208197.240:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=834371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604459.830108] audit: type=1326 audit(1689208207.040:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604476.678391] audit: type=1326 audit(1689208223.892:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604506.595388] audit: type=1326 audit(1689208253.808:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=836737 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604536.910472] audit: type=1326 audit(1689208284.124:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824480 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604588.801578] audit: type=1326 audit(1689208336.012:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604590.878115] audit: type=1326 audit(1689208338.088:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604613.330191] audit: type=1326 audit(1689208360.540:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=849945 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604648.014559] audit: type=1326 audit(1689208395.228:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604655.910760] audit: type=1326 audit(1689208403.124:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604731.191216] audit: type=1326 audit(1689208478.404:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=841978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604750.453981] audit: type=1326 audit(1689208497.664:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850369 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604790.297089] audit: type=1326 audit(1689208537.508:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=851838 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604911.917454] audit: type=1326 audit(1689208659.128:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=855574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604932.248331] audit: type=1326 audit(1689208679.459:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856349 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604979.039220] audit: type=1326 audit(1689208726.251:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=854027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605001.217428] audit: type=1326 audit(1689208748.427:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605004.825105] audit: type=1326 audit(1689208752.035:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605073.388168] audit: type=1326 audit(1689208820.599:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605073.905125] audit: type=1326 audit(1689208821.115:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861403 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605096.082181] audit: type=1326 audit(1689208843.291:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605129.878423] audit: type=1326 audit(1689208877.087:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=866278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605177.031421] audit: type=1326 audit(1689208924.243:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865008 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605235.963087] exe[867632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bc192d40a cs:33 sp:7f06f0682ee8 ax:12 si:ffffffffff600000 di:559bc1999ff2 [11605242.250840] audit: type=1326 audit(1689208989.459:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605259.396277] exe[729169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.444946] exe[734784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.493436] exe[735065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605345.057961] audit: type=1326 audit(1689209092.267:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=867457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605366.290442] audit: type=1326 audit(1689209113.499:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=872748 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605379.568477] audit: type=1326 audit(1689209126.779:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=868919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605400.381802] audit: type=1326 audit(1689209147.591:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605499.168636] audit: type=1326 audit(1689209246.379:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873036 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605641.112938] audit: type=1326 audit(1689209388.322:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=878736 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605650.594619] audit: type=1326 audit(1689209397.802:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879055 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605769.011148] audit: type=1326 audit(1689209516.218:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897739 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605783.192934] audit: type=1326 audit(1689209530.402:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=888577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605785.006125] audit: type=1326 audit(1689209532.214:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=874679 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605792.566409] audit: type=1326 audit(1689209539.774:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=899333 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605803.584285] audit: type=1326 audit(1689209550.794:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605917.107175] audit: type=1326 audit(1689209664.314:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=900168 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605999.175587] audit: type=1326 audit(1689209746.386:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=903724 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606057.989861] audit: type=1326 audit(1689209805.198:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=908771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606081.023977] audit: type=1326 audit(1689209828.234:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901681 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606081.049199] audit: type=1326 audit(1689209828.234:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606140.480349] audit: type=1326 audit(1689209887.690:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606161.551475] audit: type=1326 audit(1689209908.758:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606199.187532] audit: type=1326 audit(1689209946.394:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=916010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606218.913397] audit: type=1326 audit(1689209966.122:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922661 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606232.077547] audit: type=1326 audit(1689209979.282:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=923826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606380.343966] audit: type=1326 audit(1689210127.553:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606411.655428] audit: type=1326 audit(1689210158.861:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927181 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606523.891076] audit: type=1326 audit(1689210271.097:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606544.833841] audit: type=1326 audit(1689210292.041:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932874 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606553.082384] audit: type=1326 audit(1689210300.289:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=934463 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606576.113741] audit: type=1326 audit(1689210323.321:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606603.669625] audit: type=1326 audit(1689210350.877:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918032 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606666.104511] audit: type=1326 audit(1689210413.313:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=938428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606700.273078] audit: type=1326 audit(1689210447.481:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606722.409710] audit: type=1326 audit(1689210469.617:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=944587 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606723.591484] audit: type=1326 audit(1689210470.797:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918004 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606726.625428] audit: type=1326 audit(1689210473.833:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=925543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606749.842751] audit: type=1326 audit(1689210497.049:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606774.216268] audit: type=1326 audit(1689210521.421:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606775.272993] audit: type=1326 audit(1689210522.481:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946844 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606808.022043] audit: type=1326 audit(1689210555.229:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=942712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606825.235825] audit: type=1326 audit(1689210572.441:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=943616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606903.854733] audit: type=1326 audit(1689210651.061:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=951196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606950.408866] audit: type=1326 audit(1689210697.617:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607046.030686] audit: type=1326 audit(1689210793.237:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=955433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607082.153088] audit: type=1326 audit(1689210829.361:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963715 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607091.177801] audit: type=1326 audit(1689210838.384:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607204.949220] audit: type=1326 audit(1689210952.160:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961511 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607214.149455] audit: type=1326 audit(1689210961.360:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607234.203101] audit: type=1326 audit(1689210981.412:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=965279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607246.591122] audit: type=1326 audit(1689210993.800:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607346.908337] audit: type=1326 audit(1689211094.116:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607347.810535] audit: type=1326 audit(1689211095.020:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=976275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607373.022204] audit: type=1326 audit(1689211120.232:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607377.243731] audit: type=1326 audit(1689211124.452:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607487.048913] audit: type=1326 audit(1689211234.256:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946299 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607489.734138] audit: type=1326 audit(1689211236.944:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607499.561410] audit: type=1326 audit(1689211246.772:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607519.191537] audit: type=1326 audit(1689211266.400:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607624.457049] audit: type=1326 audit(1689211371.664:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=985128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607631.705291] audit: type=1326 audit(1689211378.916:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=983126 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607638.204050] audit: type=1326 audit(1689211385.412:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979517 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607751.083724] audit: type=1326 audit(1689211498.292:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989206 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607766.193883] audit: type=1326 audit(1689211513.404:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607770.820805] audit: type=1326 audit(1689211518.028:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=972203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607889.548013] audit: type=1326 audit(1689211636.755:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=995356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607890.272191] audit: type=1326 audit(1689211637.479:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984084 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607892.217788] audit: type=1326 audit(1689211639.427:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=994449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607973.414133] audit: type=1326 audit(1689211720.623:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607997.840992] audit: type=1326 audit(1689211745.047:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608009.823096] exe[880088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.862814] exe[908958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.905875] exe[880060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7a7858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608031.274871] audit: type=1326 audit(1689211778.483:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998191 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608034.038701] audit: type=1326 audit(1689211781.247:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998422 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608075.873755] audit: type=1326 audit(1689211823.083:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608174.269361] audit: type=1326 audit(1689211921.475:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608175.997697] audit: type=1326 audit(1689211923.203:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608317.934996] audit: type=1326 audit(1689212065.143:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16671 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608318.010584] audit: type=1326 audit(1689212065.219:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16326 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608345.573784] audit: type=1326 audit(1689212092.779:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11133 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608451.296340] audit: type=1326 audit(1689212198.503:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29829 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608460.035472] audit: type=1326 audit(1689212207.243:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608462.176738] audit: type=1326 audit(1689212209.383:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25141 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608503.267767] audit: type=1326 audit(1689212250.475:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=34498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608533.390892] audit: type=1326 audit(1689212280.598:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999989 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608586.343765] audit: type=1326 audit(1689212333.550:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11132 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608603.172815] audit: type=1326 audit(1689212350.378:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608604.375648] audit: type=1326 audit(1689212351.582:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608625.227797] audit: type=1326 audit(1689212372.434:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608653.653041] audit: type=1326 audit(1689212400.858:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996310 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608746.810007] audit: type=1326 audit(1689212494.014:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608759.068622] audit: type=1326 audit(1689212506.274:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608844.060417] audit: type=1326 audit(1689212591.266:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608849.979155] audit: type=1326 audit(1689212597.186:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26927 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608866.192620] audit: type=1326 audit(1689212613.398:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50432 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608900.419588] audit: type=1326 audit(1689212647.626:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=48313 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609041.941064] audit: type=1326 audit(1689212789.146:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609043.267962] audit: type=1326 audit(1689212790.474:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=51808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609101.039399] exe[19846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.200826] exe[42029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.233088] exe[21925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.359654] exe[14202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609114.859756] audit: type=1326 audit(1689212862.066:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=53392 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609136.468568] audit: type=1326 audit(1689212883.674:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63106 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609184.539557] audit: type=1326 audit(1689212931.746:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609224.389789] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.508861] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.664605] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.692561] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.721718] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.758715] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.820055] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.852642] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.874621] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.926286] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609296.412170] audit: type=1326 audit(1689213043.617:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=38807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609346.942415] audit: type=1326 audit(1689213094.145:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67199 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609386.199827] audit: type=1326 audit(1689213133.405:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=70379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609407.497500] audit: type=1326 audit(1689213154.701:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=80674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609489.512442] audit: type=1326 audit(1689213236.717:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=78397 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609536.734812] audit: type=1326 audit(1689213283.937:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609540.467947] audit: type=1326 audit(1689213287.673:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609578.029249] audit: type=1326 audit(1689213325.233:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609580.700973] audit: type=1326 audit(1689213327.905:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609630.673391] audit: type=1326 audit(1689213377.877:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609672.894466] audit: type=1326 audit(1689213420.097:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609673.764769] audit: type=1326 audit(1689213420.969:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56076 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609682.185992] audit: type=1326 audit(1689213429.389:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=93458 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609689.245620] audit: type=1326 audit(1689213436.449:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=39787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609704.620136] audit: type=1326 audit(1689213451.825:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103151 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609718.303851] audit: type=1326 audit(1689213465.509:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609732.024113] audit: type=1326 audit(1689213479.229:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609746.654594] audit: type=1326 audit(1689213493.857:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609891.802556] audit: type=1326 audit(1689213639.005:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=107746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609980.959613] audit: type=1326 audit(1689213728.164:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111400 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610037.921958] warn_bad_vsyscall: 57 callbacks suppressed [11610037.921961] exe[104886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cf1f3e40a cs:33 sp:7f9740193ee8 ax:12 si:ffffffffff600000 di:557cf1faaff2 [11610091.078793] audit: type=1326 audit(1689213838.284:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=114972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610124.942162] audit: type=1326 audit(1689213872.148:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610177.285395] audit: type=1326 audit(1689213924.492:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102441 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610193.441605] audit: type=1326 audit(1689213940.648:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610225.810101] audit: type=1326 audit(1689213973.016:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610233.553409] audit: type=1326 audit(1689213980.760:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610256.024194] audit: type=1326 audit(1689214003.232:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610300.269297] audit: type=1326 audit(1689214047.476:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610367.800104] audit: type=1326 audit(1689214115.008:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128262 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610392.269170] audit: type=1326 audit(1689214139.476:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610463.704357] audit: type=1326 audit(1689214210.912:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610509.525530] audit: type=1326 audit(1689214256.732:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=133363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610534.233051] audit: type=1326 audit(1689214281.440:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610535.552490] audit: type=1326 audit(1689214282.760:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102360 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610558.818901] audit: type=1326 audit(1689214306.024:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138968 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610563.001154] audit: type=1326 audit(1689214310.208:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125930 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610652.067752] audit: type=1326 audit(1689214399.272:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610675.976391] audit: type=1326 audit(1689214423.180:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610794.201252] audit: type=1326 audit(1689214541.407:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610817.416788] audit: type=1326 audit(1689214564.623:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=147787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610824.164743] audit: type=1326 audit(1689214571.371:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610917.045624] audit: type=1326 audit(1689214664.247:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610935.100843] audit: type=1326 audit(1689214682.307:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610957.386648] audit: type=1326 audit(1689214704.591:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160285 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611044.973755] audit: type=1326 audit(1689214792.179:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104427 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611052.355082] exe[161359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.396817] exe[161402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.417215] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.458817] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9dd858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611057.686547] audit: type=1326 audit(1689214804.891:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159476 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611080.561894] audit: type=1326 audit(1689214827.767:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611091.751769] audit: type=1326 audit(1689214838.955:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=163210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611106.510657] audit: type=1326 audit(1689214853.715:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164175 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611206.621679] audit: type=1326 audit(1689214953.827:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611226.105804] audit: type=1326 audit(1689214973.311:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611328.860902] audit: type=1326 audit(1689215076.067:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=136219 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611349.685728] audit: type=1326 audit(1689215096.891:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166089 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611355.989960] audit: type=1326 audit(1689215103.195:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611470.897001] exe[173131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611470.982692] exe[172685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611471.068495] exe[172788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611491.624312] audit: type=1326 audit(1689215238.826:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611498.281194] audit: type=1326 audit(1689215245.486:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171656 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611545.887586] audit: type=1326 audit(1689215293.090:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611556.965422] audit: type=1326 audit(1689215304.170:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611636.098091] audit: type=1326 audit(1689215383.302:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611641.171130] audit: type=1326 audit(1689215388.374:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176464 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611712.598686] audit: type=1326 audit(1689215459.802:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611779.405216] audit: type=1326 audit(1689215526.606:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=183629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611784.275845] audit: type=1326 audit(1689215531.478:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611807.175705] audit: type=1326 audit(1689215554.378:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139924 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611845.278909] exe[175719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.131823] exe[175495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.132343] exe[62220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.255247] exe[192224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611865.951902] exe[193267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96258cee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.843870] exe[194427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.849440] exe[193278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.684536] exe[193231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.685047] exe[193276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611923.773068] audit: type=1326 audit(1689215670.974:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611927.131634] audit: type=1326 audit(1689215674.334:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192265 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611946.855512] audit: type=1326 audit(1689215694.058:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612069.445142] audit: type=1326 audit(1689215816.646:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199539 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612092.184084] audit: type=1326 audit(1689215839.386:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205940 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612109.628298] audit: type=1326 audit(1689215856.830:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=167586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612169.655524] audit: type=1326 audit(1689215916.857:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=179867 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612196.158283] audit: type=1326 audit(1689215943.361:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612321.757529] audit: type=1326 audit(1689216068.961:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612338.198911] audit: type=1326 audit(1689216085.401:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210033 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612341.930437] audit: type=1326 audit(1689216089.133:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612480.723412] audit: type=1326 audit(1689216227.925:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612484.182272] audit: type=1326 audit(1689216231.385:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215515 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612623.704171] audit: type=1326 audit(1689216370.905:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612627.491761] audit: type=1326 audit(1689216374.693:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612650.811661] audit: type=1326 audit(1689216398.017:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612725.881937] audit: type=1326 audit(1689216473.081:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612768.073479] audit: type=1326 audit(1689216515.273:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612911.907957] exe[230755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784c9cc40a cs:33 sp:7f8d98f46ee8 ax:12 si:ffffffffff600000 di:55784ca38ff2 [11612912.026179] audit: type=1326 audit(1689216659.232:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612928.029305] audit: type=1326 audit(1689216675.232:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612933.884371] audit: type=1326 audit(1689216681.088:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613007.977947] audit: type=1326 audit(1689216755.180:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242949 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613034.707467] exe[210137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed66be340a cs:33 sp:7fd40805cee8 ax:12 si:ffffffffff600000 di:55ed66c4fff2 [11613067.683364] audit: type=1326 audit(1689216814.888:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613090.757129] audit: type=1326 audit(1689216837.960:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613156.842452] audit: type=1326 audit(1689216904.048:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162031 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613176.892347] audit: type=1326 audit(1689216924.096:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613225.327240] audit: type=1326 audit(1689216972.532:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613257.820594] audit: type=1326 audit(1689217005.024:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248201 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613259.764460] exe[113089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.896766] exe[129485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.994509] exe[113108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613260.035649] exe[167068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613367.064209] audit: type=1326 audit(1689217114.268:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=257164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613389.920266] audit: type=1326 audit(1689217137.124:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=265247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613400.171681] audit: type=1326 audit(1689217147.376:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=261413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613423.461311] audit: type=1326 audit(1689217170.664:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=267746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613556.820936] audit: type=1326 audit(1689217304.024:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=269567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613639.322076] audit: type=1326 audit(1689217386.523:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=271970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613662.359245] audit: type=1326 audit(1689217409.563:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=279508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613699.545408] audit: type=1326 audit(1689217446.747:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=274933 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613729.742873] audit: type=1326 audit(1689217476.947:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11613758.457839] audit: type=1326 audit(1689217505.659:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=208877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613841.828755] audit: type=1326 audit(1689217589.031:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613865.039411] audit: type=1326 audit(1689217612.243:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=285941 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613909.215817] exe[280649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613909.285023] exe[281621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613910.102687] exe[280647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613911.927175] audit: type=1326 audit(1689217659.131:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=283958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613926.880021] audit: type=1326 audit(1689217674.083:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=250982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613951.214334] audit: type=1326 audit(1689217698.415:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613994.384142] audit: type=1326 audit(1689217741.587:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=289847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614054.357636] audit: type=1326 audit(1689217801.559:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614197.565657] audit: type=1326 audit(1689217944.767:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293965 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614243.930801] audit: type=1326 audit(1689217991.131:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614340.962187] audit: type=1326 audit(1689218088.162:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614378.700022] audit: type=1326 audit(1689218125.902:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302653 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614436.168021] audit: type=1326 audit(1689218183.370:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=306526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614488.028688] audit: type=1326 audit(1689218235.230:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614531.437813] audit: type=1326 audit(1689218278.638:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=313198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614546.864834] audit: type=1326 audit(1689218294.066:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614567.377282] audit: type=1326 audit(1689218314.578:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=299618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614623.636542] audit: type=1326 audit(1689218370.838:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614629.720322] audit: type=1326 audit(1689218376.922:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614697.032081] audit: type=1326 audit(1689218444.234:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614708.565361] audit: type=1326 audit(1689218455.766:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=321370 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614725.059201] audit: type=1326 audit(1689218472.258:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614725.083797] audit: type=1326 audit(1689218472.270:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614763.316197] audit: type=1326 audit(1689218510.518:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614783.657848] audit: type=1326 audit(1689218530.858:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.377379] audit: type=1326 audit(1689218572.578:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.954441] audit: type=1326 audit(1689218573.154:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614826.473984] audit: type=1326 audit(1689218573.674:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614849.192210] audit: type=1326 audit(1689218596.394:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347434 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614869.432839] audit: type=1326 audit(1689218616.634:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614904.547842] audit: type=1326 audit(1689218651.746:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614919.904813] audit: type=1326 audit(1689218667.106:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344659 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614989.331061] audit: type=1326 audit(1689218736.530:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615026.778194] audit: type=1326 audit(1689218773.978:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615046.792010] audit: type=1326 audit(1689218793.989:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=353766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615075.957721] audit: type=1326 audit(1689218823.157:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=355648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615092.070251] audit: type=1326 audit(1689218839.269:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615105.006673] audit: type=1326 audit(1689218852.205:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615115.088959] audit: type=1326 audit(1689218862.289:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=374087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615140.436699] audit: type=1326 audit(1689218887.637:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=379563 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615189.321653] audit: type=1326 audit(1689218936.521:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=369018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615249.883397] audit: type=1326 audit(1689218997.081:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=377300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615278.181181] audit: type=1326 audit(1689219025.381:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=365614 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615285.687507] audit: type=1326 audit(1689219032.885:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615334.361923] audit: type=1326 audit(1689219081.561:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=386918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615358.021042] audit: type=1326 audit(1689219105.221:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=397046 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615372.830891] audit: type=1326 audit(1689219120.029:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615392.629913] audit: type=1326 audit(1689219139.829:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=391869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615418.819110] audit: type=1326 audit(1689219166.017:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615534.998711] audit: type=1326 audit(1689219282.197:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615536.639688] audit: type=1326 audit(1689219283.837:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.252941] audit: type=1326 audit(1689219319.453:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.566380] audit: type=1326 audit(1689219319.765:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=402658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615607.239874] audit: type=1326 audit(1689219354.437:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=404197 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615682.174935] audit: type=1326 audit(1689219429.373:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=395486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615749.676438] audit: type=1326 audit(1689219496.873:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=409554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615772.856758] audit: type=1326 audit(1689219520.056:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=415966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615782.603424] audit: type=1326 audit(1689219529.800:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=393960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615837.996675] audit: type=1326 audit(1689219585.196:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414088 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.905148] audit: type=1326 audit(1689219603.108:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.959406] audit: type=1326 audit(1689219603.160:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615907.170690] audit: type=1326 audit(1689219654.372:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616016.968741] audit: type=1326 audit(1689219764.168:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419234 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616018.174727] audit: type=1326 audit(1689219765.376:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419205 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616049.790873] audit: type=1326 audit(1689219796.992:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420016 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616179.467941] audit: type=1326 audit(1689219926.668:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616180.555813] audit: type=1326 audit(1689219927.756:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616192.430465] audit: type=1326 audit(1689219939.632:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616204.730256] audit: type=1326 audit(1689219951.932:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426323 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616215.467880] audit: type=1326 audit(1689219962.668:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426686 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616342.057416] audit: type=1326 audit(1689220089.260:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616344.197343] audit: type=1326 audit(1689220091.400:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427038 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616349.922513] audit: type=1326 audit(1689220097.124:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616463.003124] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117536ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.155216] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec1174f4ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.334664] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.365978] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.395492] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.434812] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.469559] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.499013] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.528098] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.559286] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.856088] audit: type=1326 audit(1689220211.056:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433896 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616468.036730] warn_bad_vsyscall: 56 callbacks suppressed [11616468.036733] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.143022] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.346868] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.476775] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.602391] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.747206] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.905526] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.069465] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.228264] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.373763] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616478.212932] audit: type=1326 audit(1689220225.412:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=399179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616486.892502] audit: type=1326 audit(1689220234.092:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616504.636883] audit: type=1326 audit(1689220251.835:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616506.387296] audit: type=1326 audit(1689220253.587:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616618.325394] audit: type=1326 audit(1689220365.523:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616624.272672] audit: type=1326 audit(1689220371.471:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616641.156448] audit: type=1326 audit(1689220388.355:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616646.887273] audit: type=1326 audit(1689220394.087:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616669.130945] audit: type=1326 audit(1689220416.331:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616671.357319] audit: type=1326 audit(1689220418.555:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616685.822247] audit: type=1326 audit(1689220433.023:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426318 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616727.733883] warn_bad_vsyscall: 14 callbacks suppressed [11616727.733887] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.854758] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.896011] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.024074] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.060517] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.174456] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.285948] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.286187] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.433658] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.542871] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.745666] warn_bad_vsyscall: 149 callbacks suppressed [11616732.745670] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.778992] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.807892] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.837387] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.866886] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.895047] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.005828] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.156311] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.302872] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.344866] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.937508] warn_bad_vsyscall: 156 callbacks suppressed [11616737.937511] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.978420] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.107496] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.221153] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.332316] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.371403] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.516981] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.646772] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.793750] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.925501] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616742.938460] warn_bad_vsyscall: 95 callbacks suppressed [11616742.938463] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.139113] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.249995] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.287426] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.799359] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.961896] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.123243] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.277308] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.579977] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.680400] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.059194] warn_bad_vsyscall: 179 callbacks suppressed [11616748.059198] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.099340] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.218641] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.353244] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.514493] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.675188] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.816625] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616748.957631] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.061746] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.178713] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.071882] warn_bad_vsyscall: 129 callbacks suppressed [11616753.071903] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.188917] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.305604] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.308145] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.434246] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.463792] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.573550] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.690786] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.948656] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616754.057794] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.088841] warn_bad_vsyscall: 69 callbacks suppressed [11616758.088845] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.198407] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.325846] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.452371] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.611864] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.848362] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.023674] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.223697] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.378129] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.414350] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.247975] warn_bad_vsyscall: 67 callbacks suppressed [11616763.247978] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.379531] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.506568] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.576974] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.712296] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.868809] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.012072] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.044986] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.075153] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.105612] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.632673] warn_bad_vsyscall: 72 callbacks suppressed [11616768.632677] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.764563] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.797201] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.945297] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.977094] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.105815] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.219603] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.319274] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.446879] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.586043] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.407661] warn_bad_vsyscall: 20 callbacks suppressed [11616774.407665] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.443917] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.480792] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.515412] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.549287] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.577325] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.615687] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.650789] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.680564] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.712742] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.732922] warn_bad_vsyscall: 59 callbacks suppressed [11616779.732927] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.873482] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.015511] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.144019] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.148245] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.292227] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.408584] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.554021] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.587092] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.707671] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616831.354738] audit: type=1326 audit(1689220578.555:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616849.536866] audit: type=1326 audit(1689220596.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616891.400048] audit: type=1326 audit(1689220638.599:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616955.867342] audit: type=1326 audit(1689220703.067:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616993.610115] audit: type=1326 audit(1689220740.811:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448725 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617027.425260] warn_bad_vsyscall: 1 callbacks suppressed [11617027.425263] exe[423335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559734aa5839 cs:33 sp:7f1166de5ee8 ax:0 si:20000240 di:ffffffffff600000 [11617031.423364] audit: type=1326 audit(1689220778.623:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617034.068901] audit: type=1326 audit(1689220781.267:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=450336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617036.395177] exe[403877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2071a9839 cs:33 sp:7f1205849ee8 ax:0 si:20000240 di:ffffffffff600000 [11617110.112230] exe[450940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563710d72839 cs:33 sp:7fb6768c9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617120.897024] audit: type=1326 audit(1689220868.095:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=452760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617155.771686] audit: type=1326 audit(1689220902.971:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617163.858912] audit: type=1326 audit(1689220911.059:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=456904 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617173.909893] audit: type=1326 audit(1689220921.107:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=359483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617177.166434] audit: type=1326 audit(1689220924.363:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453803 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617199.530594] audit: type=1326 audit(1689220946.731:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458135 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617242.071168] exe[456653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d54535f839 cs:33 sp:7fddbdecbee8 ax:0 si:20000240 di:ffffffffff600000 [11617242.806185] exe[452415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7ccdb9839 cs:33 sp:7f37b6bf9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617285.999616] exe[453136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55772e5b8839 cs:33 sp:7ea5ab3feee8 ax:0 si:20000240 di:ffffffffff600000 [11617310.725595] exe[352485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564403af1839 cs:33 sp:7fe27b9feee8 ax:0 si:20000240 di:ffffffffff600000 [11617320.633665] audit: type=1326 audit(1689221067.830:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617333.963647] audit: type=1326 audit(1689221081.162:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617344.534053] exe[456677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6142f839 cs:33 sp:7fcfb7eebee8 ax:0 si:20000240 di:ffffffffff600000 [11617407.485335] audit: type=1326 audit(1689221154.682:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617407.510562] audit: type=1326 audit(1689221154.682:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617450.603853] audit: type=1326 audit(1689221197.802:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444772 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617458.156564] exe[464010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55932fcf1839 cs:33 sp:7fadc19c2ee8 ax:0 si:20000240 di:ffffffffff600000 [11617470.363479] exe[373491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56224fbf2839 cs:33 sp:7f9f309ccee8 ax:0 si:20000240 di:ffffffffff600000 [11617473.971610] audit: type=1326 audit(1689221221.170:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617475.605465] exe[461182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796b1a858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.707828] exe[462051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.818558] exe[462052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617485.057212] audit: type=1326 audit(1689221232.254:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617570.056481] audit: type=1326 audit(1689221317.254:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=465697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617597.277555] audit: type=1326 audit(1689221344.474:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617616.134916] exe[368535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b36f85f839 cs:33 sp:7ecb96446ee8 ax:0 si:20000240 di:ffffffffff600000 [11617648.439900] audit: type=1326 audit(1689221395.638:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=467841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617678.970527] audit: type=1326 audit(1689221426.166:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=457982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617700.643689] audit: type=1326 audit(1689221447.842:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617732.017925] audit: type=1326 audit(1689221479.214:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469314 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617738.589958] audit: type=1326 audit(1689221485.786:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466971 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617740.351068] audit: type=1326 audit(1689221487.550:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617792.775079] exe[470535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93a6ea839 cs:33 sp:7ea8e19feee8 ax:0 si:20000240 di:ffffffffff600000 [11617809.463896] audit: type=1326 audit(1689221556.662:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470733 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617812.958637] exe[473479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578a49e9839 cs:33 sp:7f4af18abee8 ax:0 si:20000240 di:ffffffffff600000 [11617850.443757] audit: type=1326 audit(1689221597.642:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617882.299739] audit: type=1326 audit(1689221629.498:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617893.147005] audit: type=1326 audit(1689221640.346:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=473353 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617934.186694] audit: type=1326 audit(1689221681.382:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617983.641154] audit: type=1326 audit(1689221730.833:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618007.754035] exe[479109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc7088839 cs:33 sp:7f115bb4aee8 ax:0 si:20000240 di:ffffffffff600000 [11618023.408403] exe[477266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.501534] exe[471958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.601684] exe[471707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618024.400520] audit: type=1326 audit(1689221771.597:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=477359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618074.174434] audit: type=1326 audit(1689221821.369:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618146.086115] audit: type=1326 audit(1689221893.281:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=480365 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618165.619972] audit: type=1326 audit(1689221912.817:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.009828] audit: type=1326 audit(1689221982.205:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437493 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.035898] audit: type=1326 audit(1689221982.233:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=485075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618257.120281] audit: type=1326 audit(1689222004.317:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618306.553982] audit: type=1326 audit(1689222053.749:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618309.160749] audit: type=1326 audit(1689222056.357:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618328.009567] audit: type=1326 audit(1689222075.205:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=491196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618396.215364] audit: type=1326 audit(1689222143.413:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618458.057109] audit: type=1326 audit(1689222205.253:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618471.167306] audit: type=1326 audit(1689222218.365:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618558.971085] audit: type=1326 audit(1689222306.165:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=498306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618599.005616] audit: type=1326 audit(1689222346.201:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500998 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618614.605767] audit: type=1326 audit(1689222361.801:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471350 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618616.160870] audit: type=1326 audit(1689222363.357:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618632.621352] audit: type=1326 audit(1689222379.817:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=502952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618740.688253] audit: type=1326 audit(1689222487.888:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618794.782232] audit: type=1326 audit(1689222541.980:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=516208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618828.244900] audit: type=1326 audit(1689222575.444:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618883.250327] audit: type=1326 audit(1689222630.448:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=527662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618905.654237] audit: type=1326 audit(1689222652.852:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=539741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618955.994306] audit: type=1326 audit(1689222703.192:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618991.070845] audit: type=1326 audit(1689222738.268:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618995.914657] exe[531498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae92ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.576485] exe[545055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.698654] exe[515605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618998.466088] audit: type=1326 audit(1689222745.664:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545946 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619039.105891] audit: type=1326 audit(1689222786.304:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=540251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619081.481628] audit: type=1326 audit(1689222828.680:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619132.788973] audit: type=1326 audit(1689222879.988:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=546430 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619169.205197] audit: type=1326 audit(1689222916.404:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552581 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619181.529368] audit: type=1326 audit(1689222928.728:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=548478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619204.740432] audit: type=1326 audit(1689222951.940:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=554938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619231.628546] audit: type=1326 audit(1689222978.828:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619294.278304] audit: type=1326 audit(1689223041.476:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619302.932977] audit: type=1326 audit(1689223050.132:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=553420 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619324.619811] audit: type=1326 audit(1689223071.816:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619336.253946] audit: type=1326 audit(1689223083.452:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619398.879385] exe[536155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.939422] exe[516375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.982844] exe[535671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619453.791031] audit: type=1326 audit(1689223200.987:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619465.706772] audit: type=1326 audit(1689223212.903:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550448 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619487.423938] exe[566400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563c4858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.482399] exe[562461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.528570] exe[563319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619585.499945] audit: type=1326 audit(1689223332.695:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619596.902218] audit: type=1326 audit(1689223344.099:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565827 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619607.979102] audit: type=1326 audit(1689223355.175:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619689.631929] audit: type=1326 audit(1689223436.827:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619831.695309] audit: type=1326 audit(1689223578.891:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575570 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619856.886854] audit: type=1326 audit(1689223604.083:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577025 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619974.006322] audit: type=1326 audit(1689223721.203:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620035.655078] audit: type=1326 audit(1689223782.851:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=581361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620114.896040] audit: type=1326 audit(1689223862.090:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=547279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620115.147632] audit: type=1326 audit(1689223862.342:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620215.428928] exe[578382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.470748] exe[578378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.508820] exe[545514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620227.851853] audit: type=1326 audit(1689223975.046:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=588747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620256.627986] audit: type=1326 audit(1689224003.822:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=591341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620370.738511] audit: type=1326 audit(1689224117.934:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620399.160346] audit: type=1326 audit(1689224146.354:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596641 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620513.054444] audit: type=1326 audit(1689224260.250:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620514.934894] audit: type=1326 audit(1689224262.130:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=600527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620580.941265] audit: type=1326 audit(1689224328.134:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620643.919662] audit: type=1326 audit(1689224391.114:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620654.467678] audit: type=1326 audit(1689224401.662:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620678.185533] audit: type=1326 audit(1689224425.382:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620753.378385] audit: type=1326 audit(1689224500.574:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606613 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620775.839985] audit: type=1326 audit(1689224523.034:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620787.380160] audit: type=1326 audit(1689224534.574:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620878.192117] audit: type=1326 audit(1689224625.385:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=593770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620910.511245] audit: type=1326 audit(1689224657.705:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620929.852560] audit: type=1326 audit(1689224677.045:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=611154 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620952.654833] audit: type=1326 audit(1689224699.849:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=615888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620975.728228] exe[616067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.809466] exe[616334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.900989] exe[616113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11621052.917706] audit: type=1326 audit(1689224800.113:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614987 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621080.863296] audit: type=1326 audit(1689224828.057:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621086.905149] audit: type=1326 audit(1689224834.097:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621093.759891] audit: type=1326 audit(1689224840.953:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621116.237723] audit: type=1326 audit(1689224863.429:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620684 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621196.426285] audit: type=1326 audit(1689224943.621:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=619071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621228.541993] audit: type=1326 audit(1689224975.737:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621254.426277] audit: type=1326 audit(1689225001.621:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621296.541965] audit: type=1326 audit(1689225043.737:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621338.665441] audit: type=1326 audit(1689225085.857:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=624649 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621388.698603] audit: type=1326 audit(1689225135.893:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=626245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621531.083825] audit: type=1326 audit(1689225278.277:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621601.363569] audit: type=1326 audit(1689225348.560:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=629565 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621641.234574] audit: type=1326 audit(1689225388.432:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621743.423222] audit: type=1326 audit(1689225490.620:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621783.864792] audit: type=1326 audit(1689225531.060:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=638357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621809.898362] audit: type=1326 audit(1689225557.092:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11621826.174675] audit: type=1326 audit(1689225573.372:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621885.405910] audit: type=1326 audit(1689225632.600:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=645644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621926.533008] audit: type=1326 audit(1689225673.728:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621949.459338] audit: type=1326 audit(1689225696.656:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662571 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11621949.730129] audit: type=1326 audit(1689225696.924:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662605 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11622002.580862] audit: type=1326 audit(1689225749.776:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622027.131721] audit: type=1326 audit(1689225774.328:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622069.015849] audit: type=1326 audit(1689225816.212:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622089.768391] audit: type=1326 audit(1689225836.964:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=653611 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622168.625168] audit: type=1326 audit(1689225915.820:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622169.672061] audit: type=1326 audit(1689225916.868:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=676306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622191.522526] audit: type=1326 audit(1689225938.716:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682767 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622312.206917] audit: type=1326 audit(1689226059.399:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622325.849714] audit: type=1326 audit(1689226073.043:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=683978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622348.404390] audit: type=1326 audit(1689226095.599:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622362.583610] audit: type=1326 audit(1689226109.779:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=704093 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622455.088113] audit: type=1326 audit(1689226202.283:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700283 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622466.935089] audit: type=1326 audit(1689226214.127:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705187 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622477.541452] audit: type=1326 audit(1689226224.735:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622557.455601] audit: type=1326 audit(1689226304.651:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=607978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622607.655309] audit: type=1326 audit(1689226354.851:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=717863 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622608.716470] audit: type=1326 audit(1689226355.911:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622691.701380] audit: type=1326 audit(1689226438.895:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622713.800154] audit: type=1326 audit(1689226460.995:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622751.328494] audit: type=1326 audit(1689226498.523:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=718888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622762.643571] audit: type=1326 audit(1689226509.839:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=727402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622857.536823] audit: type=1326 audit(1689226604.731:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=724188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622886.710765] audit: type=1326 audit(1689226633.903:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=669577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622895.764400] audit: type=1326 audit(1689226642.959:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=727948 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622897.145368] audit: type=1326 audit(1689226644.339:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622929.466357] audit: type=1326 audit(1689226676.659:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735287 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622956.410483] audit: type=1326 audit(1689226703.603:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622978.960508] audit: type=1326 audit(1689226726.155:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=738227 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623001.003074] audit: type=1326 audit(1689226748.195:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=732248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623039.810310] audit: type=1326 audit(1689226787.002:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=734521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623143.007157] audit: type=1326 audit(1689226890.198:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623181.887500] audit: type=1326 audit(1689226929.078:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=741553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623285.059938] audit: type=1326 audit(1689227032.254:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745101 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623305.303399] audit: type=1326 audit(1689227052.494:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=736691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11623325.244781] audit: type=1326 audit(1689227072.438:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=747270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623428.088017] audit: type=1326 audit(1689227175.282:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=752283 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623463.547698] audit: type=1326 audit(1689227210.738:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623474.427571] audit: type=1326 audit(1689227221.618:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=738468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623495.937493] audit: type=1326 audit(1689227243.130:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=761376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623568.906516] audit: type=1326 audit(1689227316.098:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=758566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623595.832182] exe[730275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623595.961141] exe[644712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623596.000996] exe[652865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623596.743131] exe[637295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623604.447949] audit: type=1326 audit(1689227351.638:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760384 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623658.555316] audit: type=1326 audit(1689227405.746:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11623710.394610] audit: type=1326 audit(1689227457.586:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623726.609203] audit: type=1326 audit(1689227473.801:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=766143 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623747.678166] audit: type=1326 audit(1689227494.869:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=770150 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623851.594772] audit: type=1326 audit(1689227598.785:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769254 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623880.762779] audit: type=1326 audit(1689227627.953:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=770395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623966.702688] audit: type=1326 audit(1689227713.893:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624021.714876] audit: type=1326 audit(1689227768.905:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=773928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624107.271418] audit: type=1326 audit(1689227854.461:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=776320 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624163.256303] audit: type=1326 audit(1689227910.445:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=778098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624190.491756] audit: type=1326 audit(1689227937.681:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624190.516497] audit: type=1326 audit(1689227937.681:1070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624304.302834] audit: type=1326 audit(1689228051.493:1071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=781625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624308.164373] audit: type=1326 audit(1689228055.353:1072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11624331.516421] audit: type=1326 audit(1689228078.705:1073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=782698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624445.669622] audit: type=1326 audit(1689228192.861:1074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=785440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624473.221794] audit: type=1326 audit(1689228220.412:1075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624555.592591] exe[793350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104af6ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.750660] exe[793763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104af6ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.917923] exe[794368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.959425] exe[792613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.991400] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.018684] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.046809] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.077658] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.109453] exe[794436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.141961] exe[792456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624587.760151] audit: type=1326 audit(1689228334.952:1076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=791612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624614.813722] audit: type=1326 audit(1689228362.008:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624618.861142] warn_bad_vsyscall: 25 callbacks suppressed [11624618.861146] exe[794214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951732ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624618.991086] exe[784251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.109805] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.131399] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.152622] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.173362] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.193902] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.214545] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.235685] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.256595] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624732.224293] audit: type=1326 audit(1689228479.416:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=794869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624753.931616] audit: type=1326 audit(1689228501.124:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624758.040439] audit: type=1326 audit(1689228505.232:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795639 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624767.348557] audit: type=1326 audit(1689228514.540:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624833.344804] warn_bad_vsyscall: 25 callbacks suppressed [11624833.344807] exe[800273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.429199] exe[800476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.462524] exe[800159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7922858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.541509] exe[800004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.578722] exe[800004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7922858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624899.299493] audit: type=1326 audit(1689228646.492:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798894 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625016.749456] audit: type=1326 audit(1689228763.944:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=801453 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625040.759280] audit: type=1326 audit(1689228787.952:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625158.624329] audit: type=1326 audit(1689228905.816:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625180.785519] audit: type=1326 audit(1689228927.975:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625183.324190] audit: type=1326 audit(1689228930.515:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807481 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625274.601942] audit: type=1326 audit(1689229021.795:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625274.626774] audit: type=1326 audit(1689229021.795:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625314.783822] audit: type=1326 audit(1689229061.975:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625416.747406] audit: type=1326 audit(1689229163.939:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=814251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625456.396419] audit: type=1326 audit(1689229203.587:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=815492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625478.400977] audit: type=1326 audit(1689229225.591:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625559.615083] audit: type=1326 audit(1689229306.807:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625581.523653] audit: type=1326 audit(1689229328.715:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824092 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625595.643023] audit: type=1326 audit(1689229342.835:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824605 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625608.211350] audit: type=1326 audit(1689229355.403:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625619.033525] audit: type=1326 audit(1689229366.223:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625632.774332] audit: type=1326 audit(1689229379.967:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826762 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625647.248629] audit: type=1326 audit(1689229394.439:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=827431 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625647.274488] audit: type=1326 audit(1689229394.439:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=827431 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625691.645735] exe[759702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd892ee8 ax:0 si:20000140 di:ffffffffff600000 [11625691.722394] exe[759702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd892ee8 ax:0 si:20000140 di:ffffffffff600000 [11625691.788927] exe[759679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd871ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.603423] exe[805730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.659667] exe[777097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.711809] exe[759699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.768562] exe[762237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.823356] exe[760291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625725.681681] exe[830444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485284ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.785481] exe[831134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485263ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.787596] exe[831141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485242ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.901955] exe[830351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485242ee8 ax:0 si:20002140 di:ffffffffff600000 [11625728.991542] audit: type=1326 audit(1689229476.183:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625749.908122] audit: type=1326 audit(1689229497.099:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625780.587397] audit: type=1326 audit(1689229527.779:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625923.389938] audit: type=1326 audit(1689229670.578:1105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=835161 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625999.663124] audit: type=1326 audit(1689229746.854:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=842077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626029.740163] audit: type=1326 audit(1689229776.930:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=768381 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626030.055739] audit: type=1326 audit(1689229777.246:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=762300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626053.289519] audit: type=1326 audit(1689229800.478:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626060.094477] audit: type=1326 audit(1689229807.286:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=734646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626065.611638] audit: type=1326 audit(1689229812.802:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844994 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626115.632108] audit: type=1326 audit(1689229862.822:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=853899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626207.428319] audit: type=1326 audit(1689229954.618:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=859579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626229.347667] audit: type=1326 audit(1689229976.538:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=869176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626257.801803] audit: type=1326 audit(1689230004.990:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=864812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626281.709351] audit: type=1326 audit(1689230028.898:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786513 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626362.915375] audit: type=1326 audit(1689230110.106:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=869647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626384.676313] audit: type=1326 audit(1689230131.866:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626400.465790] audit: type=1326 audit(1689230147.654:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=871948 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626431.889582] exe[824456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5ab9858 ax:0 si:557385f24062 di:ffffffffff600000 [11626431.977003] exe[822566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5a98858 ax:0 si:557385f24062 di:ffffffffff600000 [11626432.752727] exe[868912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5a98858 ax:0 si:557385f24062 di:ffffffffff600000 [11626449.844604] audit: type=1326 audit(1689230197.034:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=859247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626467.900586] audit: type=1326 audit(1689230215.090:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=858178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626471.085337] audit: type=1326 audit(1689230218.274:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=884835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626518.208159] audit: type=1326 audit(1689230265.398:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=880419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626541.520466] audit: type=1326 audit(1689230288.710:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=882137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626621.306742] audit: type=1326 audit(1689230368.493:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802627 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626661.669412] audit: type=1326 audit(1689230408.857:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626682.654851] audit: type=1326 audit(1689230429.841:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=857778 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626683.322679] audit: type=1326 audit(1689230430.509:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=891507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626685.102443] exe[763210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092f0858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626685.897261] exe[760292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092cf858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626685.947864] exe[759743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092cf858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626802.478088] audit: type=1326 audit(1689230549.665:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=898944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626802.608213] audit: type=1326 audit(1689230549.797:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897429 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626870.811131] audit: type=1326 audit(1689230617.997:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=887503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626884.103833] audit: type=1326 audit(1689230631.293:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626944.498138] audit: type=1326 audit(1689230691.685:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=906454 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626945.317806] audit: type=1326 audit(1689230692.505:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=906607 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626967.298336] audit: type=1326 audit(1689230714.485:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627084.586021] audit: type=1326 audit(1689230831.773:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627085.711150] audit: type=1326 audit(1689230832.897:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627216.037403] audit: type=1326 audit(1689230963.225:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627226.699396] audit: type=1326 audit(1689230973.885:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627292.565800] audit: type=1326 audit(1689231039.753:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=926237 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627306.809578] audit: type=1326 audit(1689231053.997:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=898956 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627326.411262] audit: type=1326 audit(1689231073.597:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627329.171050] audit: type=1326 audit(1689231076.357:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=929663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627343.697582] audit: type=1326 audit(1689231090.884:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=929991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627347.341765] audit: type=1326 audit(1689231094.528:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627387.724194] audit: type=1326 audit(1689231134.916:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=911230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627460.083551] audit: type=1326 audit(1689231207.272:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930161 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627471.117425] audit: type=1326 audit(1689231218.308:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=928833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627602.515828] audit: type=1326 audit(1689231349.708:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=935893 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627612.770608] audit: type=1326 audit(1689231359.960:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=936377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627702.324683] audit: type=1326 audit(1689231449.516:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=876414 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627718.852703] audit: type=1326 audit(1689231466.044:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627744.507821] audit: type=1326 audit(1689231491.696:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627747.677132] audit: type=1326 audit(1689231494.868:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940246 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627883.851097] audit: type=1326 audit(1689231631.040:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=947704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627889.977150] audit: type=1326 audit(1689231637.168:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=948272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628024.911620] audit: type=1326 audit(1689231772.100:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=952771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628031.160290] audit: type=1326 audit(1689231778.352:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628040.642956] audit: type=1326 audit(1689231787.832:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=875034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11628046.113827] audit: type=1326 audit(1689231793.304:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958380 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628172.389002] audit: type=1326 audit(1689231919.579:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628179.234029] audit: type=1326 audit(1689231926.423:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628314.064309] audit: type=1326 audit(1689232061.251:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=962918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628322.164937] audit: type=1326 audit(1689232069.355:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963597 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628455.457515] audit: type=1326 audit(1689232202.647:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628464.666558] audit: type=1326 audit(1689232211.855:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946366 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628465.406719] audit: type=1326 audit(1689232212.595:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628570.305980] audit: type=1326 audit(1689232317.495:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931969 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628597.543731] audit: type=1326 audit(1689232344.731:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973452 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628607.168180] audit: type=1326 audit(1689232354.355:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628620.077308] audit: type=1326 audit(1689232367.267:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628686.349336] audit: type=1326 audit(1689232433.539:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628716.179608] audit: type=1326 audit(1689232463.367:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978986 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628753.935398] audit: type=1326 audit(1689232501.123:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979334 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628770.433520] audit: type=1326 audit(1689232517.623:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=933516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628827.383465] exe[951513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bfe7cee8 ax:0 si:2001a180 di:ffffffffff600000 [11628830.369955] exe[947115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bfe3aee8 ax:0 si:2001a180 di:ffffffffff600000 [11628830.550136] exe[929130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bf9feee8 ax:0 si:2001a180 di:ffffffffff600000 [11628832.839056] exe[953074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628832.962027] exe[916409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628833.786893] exe[955401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628842.002990] audit: type=1326 audit(1689232589.190:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984756 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628857.897703] audit: type=1326 audit(1689232605.086:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=982954 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628984.531869] audit: type=1326 audit(1689232731.718:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629025.421318] audit: type=1326 audit(1689232772.606:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629126.804451] audit: type=1326 audit(1689232873.990:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629148.856386] audit: type=1326 audit(1689232896.042:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996756 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629167.381892] audit: type=1326 audit(1689232914.570:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=993836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629194.884387] audit: type=1326 audit(1689232942.070:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629208.030223] audit: type=1326 audit(1689232955.218:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629230.447902] audit: type=1326 audit(1689232977.634:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629283.572378] audit: type=1326 audit(1689233030.758:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629309.223026] audit: type=1326 audit(1689233056.410:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629402.127757] exe[15167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629402.925691] exe[15173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629403.044266] exe[13690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629412.163848] audit: type=1326 audit(1689233159.350:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629425.210591] audit: type=1326 audit(1689233172.398:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10800 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629451.501171] audit: type=1326 audit(1689233198.686:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12290 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629473.439893] audit: type=1326 audit(1689233220.626:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629546.455933] audit: type=1326 audit(1689233293.641:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629606.448034] audit: type=1326 audit(1689233353.633:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629607.009921] audit: type=1326 audit(1689233354.197:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5631 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629609.955561] audit: type=1326 audit(1689233357.141:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629627.321516] audit: type=1326 audit(1689233374.505:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629707.742545] audit: type=1326 audit(1689233454.929:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629850.465525] audit: type=1326 audit(1689233597.649:1198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=45171 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629868.399707] audit: type=1326 audit(1689233615.585:1199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44717 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629872.952680] audit: type=1326 audit(1689233620.137:1200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=52721 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630030.618773] audit: type=1326 audit(1689233777.805:1201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54149 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630045.395436] audit: type=1326 audit(1689233792.581:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=911851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630106.444998] audit: type=1326 audit(1689233853.629:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630109.684123] audit: type=1326 audit(1689233856.869:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630122.415862] audit: type=1326 audit(1689233869.601:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630133.035799] audit: type=1326 audit(1689233880.221:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630145.615898] audit: type=1326 audit(1689233892.801:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65800 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630159.315944] audit: type=1326 audit(1689233906.501:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=960226 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630160.574939] audit: type=1326 audit(1689233907.761:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630178.188428] audit: type=1326 audit(1689233925.373:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630208.508185] audit: type=1326 audit(1689233955.693:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63231 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630268.539316] audit: type=1326 audit(1689234015.728:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630294.692266] audit: type=1326 audit(1689234041.880:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630400.813582] audit: type=1326 audit(1689234148.000:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73111 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630430.900562] audit: type=1326 audit(1689234178.088:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630432.555274] audit: type=1326 audit(1689234179.744:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630472.924734] audit: type=1326 audit(1689234220.112:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630543.165758] audit: type=1326 audit(1689234290.352:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=77048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630592.902117] audit: type=1326 audit(1689234340.088:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=79980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630612.779733] audit: type=1326 audit(1689234359.968:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=71421 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630671.563741] exe[933990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.656538] exe[935243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e8f2858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.657094] exe[934183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.775717] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.796107] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.817615] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.838102] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.858928] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.879745] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.900515] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630686.088924] audit: type=1326 audit(1689234433.276:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=84298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630754.429805] audit: type=1326 audit(1689234501.616:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630797.015329] audit: type=1326 audit(1689234544.204:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630803.172429] audit: type=1326 audit(1689234550.360:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630803.316628] audit: type=1326 audit(1689234550.504:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630826.140992] audit: type=1326 audit(1689234573.328:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630828.789712] audit: type=1326 audit(1689234575.976:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630931.941194] audit: type=1326 audit(1689234679.128:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630960.968341] audit: type=1326 audit(1689234708.155:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630971.081558] audit: type=1326 audit(1689234718.267:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96327 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630993.604507] audit: type=1326 audit(1689234740.791:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631095.668165] audit: type=1326 audit(1689234842.855:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631128.093354] audit: type=1326 audit(1689234875.279:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631257.642898] audit: type=1326 audit(1689235004.827:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=105488 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631270.385609] audit: type=1326 audit(1689235017.571:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106057 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631419.419518] audit: type=1326 audit(1689235166.607:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631582.300448] audit: type=1326 audit(1689235329.487:1237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121859 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631624.654817] audit: type=1326 audit(1689235371.839:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631699.023697] audit: type=1326 audit(1689235446.210:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631736.259800] audit: type=1326 audit(1689235483.442:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125186 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11631759.179290] audit: type=1326 audit(1689235506.362:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=126745 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631800.686165] audit: type=1326 audit(1689235547.870:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631856.695284] audit: type=1326 audit(1689235603.878:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=88236 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631900.127702] audit: type=1326 audit(1689235647.310:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631916.772415] audit: type=1326 audit(1689235663.954:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631942.479555] audit: type=1326 audit(1689235689.662:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632080.328408] audit: type=1326 audit(1689235827.514:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139436 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632164.881969] audit: type=1326 audit(1689235912.066:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=126954 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632208.737639] audit: type=1326 audit(1689235955.922:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632215.574738] audit: type=1326 audit(1689235962.758:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=152768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632242.906806] audit: type=1326 audit(1689235990.090:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632259.274629] audit: type=1326 audit(1689236006.458:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632286.126517] audit: type=1326 audit(1689236033.310:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157913 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632408.470177] audit: type=1326 audit(1689236155.653:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146569 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632535.457323] audit: type=1326 audit(1689236282.641:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160861 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632540.257343] audit: type=1326 audit(1689236287.441:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168975 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632540.286544] audit: type=1326 audit(1689236287.469:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632542.632756] audit: type=1326 audit(1689236289.817:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158102 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632697.975936] audit: type=1326 audit(1689236445.157:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632735.256192] audit: type=1326 audit(1689236482.437:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154417 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632862.166502] audit: type=1326 audit(1689236609.349:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632869.895056] audit: type=1326 audit(1689236617.077:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=173000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633011.322614] audit: type=1326 audit(1689236758.505:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633014.331009] audit: type=1326 audit(1689236761.513:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159475 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633032.164525] audit: type=1326 audit(1689236779.345:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633074.646811] audit: type=1326 audit(1689236821.825:1266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=194947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633178.382123] audit: type=1326 audit(1689236925.568:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=193526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633210.844870] audit: type=1326 audit(1689236958.028:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196118 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633237.472180] audit: type=1326 audit(1689236984.656:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633320.216899] audit: type=1326 audit(1689237067.400:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633372.631508] audit: type=1326 audit(1689237119.816:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=218119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633442.080125] audit: type=1326 audit(1689237189.264:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=224638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633451.953592] audit: type=1326 audit(1689237199.140:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191551 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633534.694699] audit: type=1326 audit(1689237281.880:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633583.260228] audit: type=1326 audit(1689237330.444:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633605.153463] audit: type=1326 audit(1689237352.336:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633618.327114] audit: type=1326 audit(1689237365.512:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176708 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633674.629388] audit: type=1326 audit(1689237421.812:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633695.748765] audit: type=1326 audit(1689237442.932:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633775.199511] audit: type=1326 audit(1689237522.384:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633856.443829] audit: type=1326 audit(1689237603.627:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633857.100887] audit: type=1326 audit(1689237604.283:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248583 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633879.369215] audit: type=1326 audit(1689237626.551:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=262612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633894.013646] audit: type=1326 audit(1689237641.195:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=273812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11634019.963746] audit: type=1326 audit(1689237767.147:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=275224 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11634029.100027] host.test[300842] bad frame in rt_sigreturn frame:000000009bf7b9ad ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [11634062.961914] audit: type=1326 audit(1689237810.147:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11634077.117957] audit: type=1326 audit(1689237824.303:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000