2018/07/18 21:16:48 fuzzer started 2018/07/18 21:16:48 dialing manager at 127.0.0.1:37169 2018/07/18 21:16:48 syscalls: 213 2018/07/18 21:16:48 code coverage: support is not implemented in syzkaller 2018/07/18 21:16:48 comparison tracing: support is not implemented in syzkaller 2018/07/18 21:16:48 setuid sandbox: support is not implemented in syzkaller 2018/07/18 21:16:48 namespace sandbox: support is not implemented in syzkaller 2018/07/18 21:16:48 fault injection: support is not implemented in syzkaller 2018/07/18 21:16:48 leak checking: support is not implemented in syzkaller 2018/07/18 21:16:48 net packed injection: support is not implemented in syzkaller 2018/07/18 21:16:48 net device setup: support is not implemented in syzkaller 21:16:48 executing program 0: send_event(&(0x7f0000000080)={&(0x7f0000000000)="c4ead9cad43efd6067862e655e6f0276c206c05850dcdb6b5b094750139918c5ab36491252ceec23bef4566cd339fdc91c7cadd80e5fc6af262550dd5ff00a07bebf612d7ec2a7a1f9214cbd03ecfac5", 0x1000, 0x0, 0x8000, 0x0, 0x1}, &(0x7f00000001c0)={0x3, 0x7, 0x408, &(0x7f00000000c0)="8b6e10be80652cf47fc406492c06d1220629f31528667a3772700961d8f2b2e215ae09952529e1fafa7b6039c3f8d3cdc768723b0d3996d3824186ac5a29d03c187c79c057ccbd156532e224f680b4d7ebab463ac854dafee87515896919cb5e0252da38a42a97e06b7754ffd797ecfe5c7316447f5a9685cc7d9765dc7a840815857dff70c625eb6e0bd6c6a76277f4c92b9637b1994629e190571bbb042ba0ee0b1afda4d57dd5914774afef7618bfad9149e0daf971def664bb0691be457997fcaa853cfca3092a73935838fbb9dccb91dce004d91f117fb5938dc3f1", 0x401}, 0x3) send_event(&(0x7f0000000280)={&(0x7f0000000200)="352dc1889cc432c6356ca066968b181cea9bb5aef5845018aca8aacb30bf9bb03557e9cb4278bab7c7f91a72ca216fbc0f8ecfa04641a9a9bc4b7bb8ed6733f1a929ec1f9e0ad7041e8c1b0523357814", 0xffffffff, 0x0, 0x400, 0x0, 0x7}, &(0x7f0000000340)={0xa, 0x1000, 0x3, &(0x7f00000002c0)="c93829f8dedc6493349cc37372262f8765df2c045aa96a28f137c25602e5547f0167b3a643cafb8e7d9c33166ef2b9bb930883f6bc26d1b2baf32fe2e5e830e1759c8cfdc283f03f4667f49dc63ec8e514e44af9d87e30fa4164f5ce90e886f817211c", 0x8000}, 0xffffffffffffffd3) r0 = openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) send_event(&(0x7f0000000480)={&(0x7f0000000400)="42d77f7906e4f9ec33f43a5afb5b650a881b4bd9f4fbf5661e4ef26cbee6d6849421905f5aedf7ec55e864d22aa35d5f787258d0f1819dfba0405fa78ba3a6387a6e9b139416df72a9095363b8a433c9", 0x1, 0x0, 0x10000000000, 0x8ee1, 0xd6}, &(0x7f0000000500)={0x7, 0x7fffffff, 0xe8, &(0x7f00000004c0)="a35c5a0a532b9d2f9b145de4f4febc18c4a12adbdaf48a6e295ac5a46d6da190c128d700d12111dd63fe70582a", 0x9}, 0x3) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) r1 = openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000580)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) close(r0) nmount(r0, &(0x7f00000005c0)='./file0\x00', 0x8, 0x4) change_vcore(0xfffffffffffffff9, 0x1) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000600)='/dev/cputime\x00', 0xd, 0x1, 0x0) send_event(&(0x7f00000006c0)={&(0x7f0000000640)="1ce5ec7c37f835f1473ec0bf8c545d651e5df39ba1820b8e3add296fa404bbb511c719baa1989d0d36ec1c3ffa6cb810d021a0fd17d3e24575f8003a875eac924da4ea6c7edefb84b69ec0d0f67218f5", 0x100000000, 0x0, 0x7, 0x4, 0x6}, &(0x7f00000007c0)={0x7, 0xef600f9, 0xe347, &(0x7f0000000700)="99a04d3068f913715601ce31e28bf841033102514cb80ec86b9c8e97cb96ce518fd5c092776161eda0f4d5539c5f6ce9daf372ded945d1a960aceb234bb54a54c7fa9295462e7852bf7391d608d56d02c979e56da068b86d6d6f0d1e69e486832f8f486003a962f45d522d54f118baadab092dbe0f5840d355f031277d94d79534c0590a673a5e04b3acba1afc12f0d6e0625d", 0x6}, 0x0) send_event(&(0x7f0000000880)={&(0x7f0000000800)="6b7e9a0bd7113fde97be76481a4b0f77c86a50c82a1bff25e39c9a856dad9ec09ac4218cdced9d01c62692a732efe445fd0ff6c51b948f60def9100c3c7df8ac3a8c5d19252ff9a7acbd9e3dbc745e6c", 0x7fffffff, 0x1, 0x2030, 0xbe, 0x9}, &(0x7f0000000940)={0x3f, 0x5, 0x80000000, &(0x7f00000008c0)="a5aeac3181213c8e1034c6360eb137606438afdbd088b488ec330f09753d3dac1711a21b53941af0a505b18d62053330c5734be4128a653e00e4ae23f00e977585cfc12889cb469ef2b7638a8f01494cf3fbf62fe4008f7fd1b04c", 0x6}, 0x4) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f00000009c0)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000a80)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$dev_cons(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/cons\x00', 0xa, 0x3, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000b00)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000bc0)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000c00)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) nmount(r1, &(0x7f0000000c40)='./file0\x00', 0x8, 0x14) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000c80)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/time\x00', 0xa, 0x3, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000d00)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000d40)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/user\x00', 0xa, 0x3, 0x0) 21:16:48 executing program 1: abort_sysc(0x5) vmm_poke_guest(0x100000001) r0 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) fcntl$F_GETFD(r0, 0x1) r1 = openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) write(r0, &(0x7f0000000080)="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", 0xfc) r2 = openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000180)='/prof/.empty\x00', 0xd, 0x3, 0x0) fchdir(0xffffffffffffffff, r2) vmm_ctl$VMM_CTL_SET_EXITS(0x2, 0x1) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/profile\x00', 0x13, 0x1, 0x0) fcntl$F_SETFD(r0, 0x2, 0x1) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/status\x00', 0x12, 0x1, 0x0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000300)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x8, 0x106) fcntl$F_SYNC(r1, 0x65) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f00000003c0)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) r3 = openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000400)='/net/ndb\x00', 0x9, 0x3, 0x0) write(r0, &(0x7f0000000440)="808e1f0fa0a864b3cb397eb8c7ff06daecacd3f85804b402f22de4468fa6da7b8927d49c3140d1d7486032ef83dd0e05e18bb62fc0a8ed9aa64680353bbbd3f3da65dc05cb61e9a251c4211b71eca1b3bff2abff044615c7e99748abd75509f1a2e416df828dd9b2d66f3ad8392cea8499d8b60a5305f4b05cab0752d77cb0067535dd797cfc25a9e1c9b65dd3c9df90d020883b6f868f9de6785d14b7a876e52fd6dc0fcc20284f04f3d569a87bc402b63fff7ebfa65708d62a4e2d6dbbd0f6d91083facbeca44f3d21dfbd0d2cde256affdad0e61793dc9e651e6b9bc7bbe70b6889d6bb8ff51cc514c2e6eebb1c2f9eab16850edce16ccf", 0xf9) tcgetattr(r2, &(0x7f0000000540)) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000600)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000640)='/net/ndb\x00', 0x9, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000680)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) write(r3, &(0x7f00000006c0)="64210e3148c21ad7c4a0abb8c19d3edefdb775edbcacc9e6d749670aa7ef9d1b80c0d057e69bfabf8f388d15e37681c0723009a05d47492ebadea9799991a07b1bbc974b591f03c54a29233203196eaecdd0", 0x52) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000740)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) 21:16:48 executing program 2: r0 = openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) r1 = openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) r2 = openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/strace\x00', 0x12, 0x1, 0x0) fcntl$F_DUPFD(r1, 0x0, r0, 0x1) openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/kprintx\x00', 0xe, 0x3, 0x0) fork() r3 = openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/random\x00', 0xc, 0x1, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000440)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000480)='/dev/killkid\x00', 0xd, 0x3, 0x0) change_vcore(0xfffffffffffffffa, 0x1) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000500)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x8, 0x100) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000580)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) fcntl$F_DUPFD(r3, 0x0, r2, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000600)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000640)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) 21:16:48 executing program 3: r0 = proc_create(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='\x00', 0x1, 0x1) r1 = openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bintime\x00', 0xd, 0x3, 0x0) fchdir(r0, r1) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) nunmount(&(0x7f0000000100)='./file0\x00', 0x8, &(0x7f0000000140)='./file0\x00', 0x8) openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) r2 = openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000280)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', 0x8, &(0x7f0000000300)) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/wait\x00', 0x10, 0x1, 0x0) chdir(r0, &(0x7f0000000400)='./file0\x00', 0x8) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sysstat\x00', 0xd, 0x3, 0x0) rename(&(0x7f0000000480)='./file0\x00', 0x8, &(0x7f00000004c0)='./file0\x00', 0x8) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000500)='/dev/stdout\x00', 0xc, 0x3, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000540)='/dev/swap\x00', 0xa, 0x3, 0x0) r3 = openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) poke_ksched(r0, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) fcntl$F_SETFL(r3, 0x4, 0x108000) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000680)='/dev/time\x00', 0xa, 0x3, 0x0) tcgetattr(r2, &(0x7f00000006c0)) symlink(&(0x7f0000000700)='./file0\x00', 0x8, &(0x7f0000000740)='./file0\x00', 0x8) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000780)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000800)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) 21:16:48 executing program 4: openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f00000000c0)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) r0 = openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) r1 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppid\x00', 0xa, 0x1, 0x0) llseek(r1, 0x200, 0x4, &(0x7f0000000200), 0x3) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000240)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000280)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000340)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', 0x8, &(0x7f0000000400)) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$dev_cons(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cons\x00', 0xa, 0x3, 0x0) abort_sysc(0x2) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000540)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/args\x00', 0x10, 0x3, 0x0) tcgetattr(r0, &(0x7f0000000600)) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) llseek(r0, 0x7, 0x902c, &(0x7f0000000680), 0x1) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000700)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/ns\x00', 0xe, 0x1, 0x0) 21:16:48 executing program 5: nanosleep(&(0x7f0000000000)={0x7, 0x20}, &(0x7f0000000040)) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)='./file0\x00', 0x8) r0 = openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipselftab\x00', 0xf, 0x1, 0x0) openat$dev_config(0xffffffffffffff9c, &(0x7f0000000180)='/dev/config\x00', 0xc, 0x1, 0x0) fcntl$F_SYNC(r0, 0x65) r1 = openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x108400) tap_fds(&(0x7f00000002c0)=[{r0, 0x3, 0x202, 0x0, &(0x7f0000000280)={&(0x7f0000000200)="33e5e747bd124e35bd901245b989bb33a1e3cbe391f38014a7f9245a169cad31661b1406280d4f802d9f1ef436ced27f6af5fcc026e337ea8539ed78903cf939b6a47115682edd1c113ab537f489e4c9", 0x651, 0x0, 0x400, 0x101}}], 0x1) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kmesg\x00', 0xb, 0x1, 0x0) populate_va(&(0x7f0000ffd000/0x1000)=nil, 0x7) openat$dev_config(0xffffffffffffff9c, &(0x7f0000000340)='/dev/config\x00', 0xc, 0x1, 0x0) r2 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) fchdir(0x0, r2) r3 = openat$proc_self_fd(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/fd\x00', 0xe, 0x1, 0x0) r4 = openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000400)='/net/iprouter\x00', 0xe, 0x3, 0x0) unlink(&(0x7f0000000440)='./file0\x00', 0x8) openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/1/err\x00', 0x11, 0x3, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000500)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000580)='/net/iproute\x00', 0xd, 0x3, 0x0) proc_yield(0x1) fstat(r4, &(0x7f00000005c0)) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$dev_stdin(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/stdin\x00', 0xb, 0x3, 0x0) openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ppid\x00', 0xa, 0x1, 0x0) fcntl$F_DUPFD(r3, 0x0, r1, 0x1) rename(&(0x7f0000000740)='./file0\x00', 0x8, &(0x7f0000000780)='./file0\x00', 0x8) 21:16:48 executing program 6: vmm_ctl$VMM_CTL_GET_EXITS(0x1) r0 = proc_create(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='V+\x00', 0x3, 0x1) provision(r0, 0x0, 0xdc) exec(&(0x7f0000000080)='./file0\x00', 0x8, &(0x7f00000000c0)='+\'\x00', 0x3) r1 = openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) llseek(r1, 0x1, 0x0, &(0x7f0000000180), 0x2) nbind(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)='./file0\x00', 0x8, 0x14) nbind(&(0x7f0000000240)='./file1\x00', 0x8, &(0x7f0000000280)='./file0\x00', 0x8, 0x14) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000340)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) nbind(&(0x7f00000003c0)='./file1\x00', 0x8, &(0x7f0000000400)='./file0\x00', 0x8, 0x4) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000480)='/dev/osversion\x00', 0xf, 0x1, 0x0) r2 = openat$dev_user(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/user\x00', 0xa, 0x3, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000500)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/profile\x00', 0x13, 0x1, 0x0) mkdir(&(0x7f00000005c0)='./file1\x00', 0x8, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000600)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f0000000680)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3, 0x2011, r2, 0x6) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) change_to_m() proc_create(&(0x7f0000000700)='./file0\x00', 0x8, &(0x7f0000000740)='\x00', 0x1, 0x0) openat$net_log(0xffffffffffffff9c, &(0x7f0000000780)='/net/log\x00', 0x9, 0x3, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/profile\x00', 0x13, 0x1, 0x0) 21:16:48 executing program 7: openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) r0 = openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000040)='/prof/.empty\x00', 0xd, 0x3, 0x0) r1 = openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000100)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/consctl\x00', 0xd, 0x3, 0x0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$dev_ppid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppid\x00', 0xa, 0x1, 0x0) r2 = openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000400)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) fd2path(r2, &(0x7f0000000500)=""/41, 0x29) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000540)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) fcntl$F_DUPFD(r1, 0x0, r0, 0x1) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) r3 = openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000600)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) openat(r3, &(0x7f0000000640)='./file0\x00', 0x8, 0x100, 0x42) openat$dev_cons(0xffffffffffffff9c, &(0x7f0000000680)='/dev/cons\x00', 0xa, 0x3, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) bash-4.3$ [kernel] Vcoreid 32768 unsafe! (too big?) Unhandled user trap in vcore context from VC 2 [kernel] Unknown mbox type 2038421314! HW TRAP frame (partial) at 0xffffffffc86681a0 on core 3 [kernel] Unknown mbox type 2095899932! rax 0x8efbca43a6b36701 Backtrace of user context on Core 1: rbx 0x0000100000006a50 Offsets only matter for shared libraries rcx 0x0000300000015000 #01 rdx 0x0000000000000000 Addr 0x0000000000409b5d is in syz-executor at offset 0x0000000000009b5d rbp 0x000030000001cef0 #02 rsi 0x000000000000000a Addr 0x0000000000416854 is in syz-executor at offset 0x0000000000016854 rdi 0x00000000200002c0 #03 r8 0x0000000000000000 Addr 0x000000000040c874 is in syz-executor at offset 0x000000000000c874 r9 0x0000000000000000 #04 r10 0x0000000000000000 Addr 0x000000000040c8a6 is in syz-executor at offset 0x000000000000c8a6 r11 0x0000000000000200 #05 r12 0x000030000001cf00 r13 0x000000000000000a Addr 0x000000000040c9f2 is in syz-executor at offset 0x000000000000c9f2 r14 0x0000000000000000 #06 r15 0x0000000000000000 Addr 0x0000000000408028 is in syz-executor at offset 0x0000000000008028 trap 0x0000000d General Protection #07 gsbs 0x0000000000000000 Addr 0x0000000000403a89 is in syz-executor at offset 0x0000000000003a89 #08 fsbs 0x0000000000000000 Addr 0x00000000004143fc is in syz-executor at offset 0x00000000000143fc err 0x--------00000000 #09 rip 0x0000000000414b1d Addr 0x0000000000414401 is in syz-executor at offset 0x0000000000014401 cs 0x------------0023 21:16:54 executing program 0: openat$dev_swap(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) flag 0x0000000000010282 rsp 0x000030000001cef0 ss 0x------------001b err 0x0 (for PFs: User 4, Wr 2, Rd 1), aux 0x0000000000000000 Addr 0x0000000000414b1d is in syz-executor at offset 0x0000000000014b1d VM Regions for proc 37 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b5000): 0x00000005, 0x00000001, 0xffff8000041ea820, 0x0000000000000000 01: (0x00000000004b5000 - 0x00000000004b6000): 0x00000005, 0x00000002, 0xffff8000041ea820, 0x00000000000b5000 02: (0x00000000006b5000 - 0x00000000006b8000): 0x00000003, 0x00000002, 0xffff8000041ea820, 0x00000000000b5000 03: (0x00000000006b8000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff8000041ea820, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 3: Offsets only matter for shared libraries #01 Addr 0x0000000000414b1d is in syz-executor at offset 0x0000000000014b1d #02 Addr 0x000000000040c82d is in syz-executor at offset 0x000000000000c82d #03 Addr 0x000000000040c8a6 is in syz-executor at offset 0x000000000000c8a6 #04 Addr 0x000000000040c9f2 is in syz-executor at offset 0x000000000000c9f2 #05 Addr 0x0000000000408028 is in syz-executor at offset 0x0000000000008028 #06 Addr 0x0000000000403a89 is in syz-executor at offset 0x0000000000003a89 #07 Addr 0x00000000004143fc is in syz-executor at offset 0x00000000000143fc #08 Addr 0x0000000000414401 is in syz-executor at offset 0x0000000000014401 21:16:58 executing program 0: openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) r0 = openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) tcgetattr(r0, &(0x7f0000000080)) 21:16:58 executing program 0: openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/1/type\x00', 0xffffffffffffff6c, 0x1, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sysstat\x00', 0xd, 0x3, 0x0) Which cores are provisioned to which procs: 21:16:59 executing program 4: tcgetattr(0xffffffffffffffff, &(0x7f0000000000)) llseek(0xffffffffffffffff, 0x5, 0x1, &(0x7f0000000040), 0x2) ------------------ 21:16:59 executing program 1: r0 = openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/2/status\x00', 0x96, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x32, r0, 0x0) Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 66(0xffff8000161f6d00) Core 02, prov: 0(0x0000000000000000) alloc: 61(0xffff800002174000) Core 03, prov: 0(0x0000000000000000) alloc: 62(0xffff8000161f9ac0) Which cores are provisioned to which procs: ------------------ Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 66(0xffff8000161f6d00) Core 02, prov: 0(0x0000000000000000) alloc: 62(0xffff8000161f9ac0) Core 03, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) 21:17:00 executing program 0: r0 = openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) close(r0) 21:17:00 executing program 1: r0 = openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) fstat(r0, &(0x7f0000000080)) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kprint\x00', 0xffffffffffffffda, 0x1, 0x0) 21:17:00 executing program 4: r0 = openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xa, 0x1, 0x0) llseek(r0, 0x0, 0x0, &(0x7f00000002c0), 0x0) 21:17:00 executing program 5: r0 = openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) tcgetattr(r0, &(0x7f0000000040)) r1 = openat$dev_zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0xfffffffffffffd3d, 0x1, 0x0) r2 = openat(r1, &(0x7f0000000600)='./file0\x00', 0x8, 0x8840, 0x151) nmount(r2, &(0x7f0000000080)='./file0\x00', 0x8, 0x14) 21:17:00 executing program 7: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x97214ca0ce119b56) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) 21:17:00 executing program 2: openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) r0 = openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000000)='/net/iproute\x00', 0xd, 0x3, 0x0) fcntl$F_GETFD(r0, 0x1) 21:17:00 executing program 6: r0 = openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/ifstats\x00', 0xbd800fa1935a50d2, 0x1, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x8, 0x40, 0x0) read(r0, &(0x7f0000000080), 0x0) wstat(&(0x7f0000000000)='./file1\x00', 0x8, &(0x7f0000000100)=""/188, 0xbc, 0x0) 21:17:00 executing program 3: r0 = openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000180)='/net/ndb\x00', 0x9, 0x3, 0x0) abort_sysc_fd(r0) fwstat(r0, &(0x7f0000000000)=""/48, 0x30, 0x0) fd2path(r0, &(0x7f0000000080)=""/170, 0xaa) 21:17:00 executing program 0: r0 = openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000000)='/dev/time\x00', 0xa, 0x3, 0x0) fstat(r0, &(0x7f00000000c0)) 21:17:00 executing program 7: openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hostowner\x00', 0x35e, 0x3, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/clone\x00', 0xf, 0x3, 0x0) 21:17:00 executing program 5: r0 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000040)='/prof/.empty\x00', 0xd, 0x3, 0x0) fd2path(r0, &(0x7f00000006c0)=""/120, 0x78) 21:17:00 executing program 4: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) 21:17:00 executing program 1: r0 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000300)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sdctl\x00', 0x2dd, 0x3, 0x0) fcntl$F_GETFD(r0, 0x1) fcntl$F_SETFD(r0, 0x2, 0x1) 21:17:00 executing program 7: r0 = openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000000)='/dev/klog\x00', 0x1ec, 0x1, 0x0) r1 = openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/status\x00', 0x12, 0x1, 0x0) tap_fds(&(0x7f0000000200)=[{r0, 0x3, 0x7909faf2b990e2f8, 0x5944, &(0x7f00000000c0)={&(0x7f0000000040)="a824e3aab6a9f9caaca9bdc491c6607c37bc8a7f8d38606b00b120a9a9511582a745019aee499598f7c35843e04f2b91511dd5cbedf7b2cc6b3157f1ed324eadd15339478d8e81b09ce3a1472c64ce37", 0x100, 0x0, 0xffffffffffffff9e, 0xff, 0x7ff}}, {r1, 0x3, 0x2, 0x40, &(0x7f00000001c0)={&(0x7f0000000140)="87eca97a2e037bc4a6c432f8b6818f18fe2f39247fd42173210d64726ace6cb9d607f3abb123a0bd2614584f08f6077caf6af04b3835f407f50f5de45bb181f5ad436f361f1f1ed0b8726789a897d777", 0x1, 0x0, 0x40, 0x48b5db54, 0x7}}], 0x2) nbuf 48, STAT_FIX_LEN_9P 49 BIT16SZ 2, GBIT16(buf) 0 This is bad! 21:17:00 executing program 0: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000001) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) 21:17:00 executing program 1: r0 = openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000000)='/dev/caphash\x00', 0xd, 0x3, 0x0) llseek(r0, 0x5, 0x6, &(0x7f00000000c0), 0x2) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/fd\x00', 0xe, 0x1, 0x0) llseek(r0, 0x0, 0x0, &(0x7f0000000040), 0x0) 21:17:00 executing program 2: mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/stats\x00', 0xf, 0x1, 0x0) change_to_m() openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000140)='/net/cs\x00', 0x8, 0x3, 0x0) populate_va(&(0x7f0000000000/0x2000)=nil, 0x800000000000) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pid\x00', 0x9, 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000000) 21:17:00 executing program 5: r0 = openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x8, 0x44, 0xffbfffffffffffff) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/pid\x00', 0x9, 0x1, 0x0) nunmount(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)='./file0\x00', 0x8) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/text\x00', 0x9, 0x1, 0x0) 21:17:00 executing program 4: r0 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/clone\x00', 0xfffffefa, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x80000) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/args\x00', 0x10, 0x3, 0x0) fcntl$F_DUPFD(r0, 0x0, r0, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) nbuf 48, STAT_FIX_LEN_9P 49 BIT16SZ 2, GBIT16(buf) 0 This is bad! 21:17:00 executing program 3: nbind(&(0x7f0000000240)='./file0\x00', 0x8, &(0x7f0000000280)='./file0\x00', 0x8, 0x11) notify(0xffffffffffffffff, 0x0, &(0x7f0000000080)={0xf, 0x1, 0x100000000, &(0x7f0000000000)="33f8085fa609c61655664b2f54814fcdeec3784836cfcaac89f540a8dae860b2662ebe4aa546469d2f92194acdf3052a840a2578cb5d988b9499633e87cfcbb01f6f7daa92c970f054696cfc391456a582f153757cc0f8e1045e2ddfa1c7aa7ee505fceae4a63a718eea45158f77c300aaa94cd88254967e5e97d7", 0x7}) notify(0x0, 0x4, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000100)}) send_event(&(0x7f0000000140)={&(0x7f00000000c0)="eeef1b161659cad7c0ab045aeb9bc56b57cd7c54c74b8fada8f83aff43e2e29c86cc3ce905701841369a463f50cdb439ef0d63e2fee58cc3aba06791316fe4fb864d9157e38c5cd9d070d79d14492272", 0x1000, 0x1, 0x4, 0xfffffffeffffffff, 0x8000}, &(0x7f0000000200)={0x3, 0x3, 0x6, &(0x7f00000001c0)="20bcdb6ab114ea317d", 0x6}, 0x2) openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) link(&(0x7f0000000300)='./file0\x00', 0x8, &(0x7f0000000340)='./file0\x00', 0x8) 21:17:00 executing program 4: r0 = openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000000)='/dev/swap\x00', 0xa, 0x3, 0x0) fstat(r0, &(0x7f0000000040)) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000100)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000180)='/dev/klog\x00', 0xa, 0x1, 0x0) r1 = openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cputime\x00', 0xffffff15, 0x1, 0x0) tcgetattr(r1, &(0x7f0000000300)) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sysstat\x00', 0xffffffffffffffb2, 0x3, 0x0) 21:17:00 executing program 7: openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) r0 = openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000040)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) tcgetattr(r0, &(0x7f00000006c0)) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pid\x00', 0x9, 0x1, 0x0) 21:17:00 executing program 5: r0 = openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capuse\x00', 0xc, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x108000) tcgetattr(r0, &(0x7f00000000c0)) nanosleep(&(0x7f0000000000), &(0x7f0000000040)) 21:17:00 executing program 1: openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) r0 = openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000140)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000040)='/dev/drivers\x00', 0xd, 0x1, 0x0) fstat(r0, &(0x7f0000000540)) kernel panic at kern/src/mm.c:737, from core 2: [kernel] Unknown mbox type 370929646! assertion failed: !pte_is_mapped(pte)[kernel] Unknown mbox type 370929646! Stack Backtrace on Core 2: #01 [<0xffffffffc200a3e7>] in backtrace #02 [<0xffffffffc2009bb2>] in _panic #03 [<0xffffffffc200dbd3>] in map_page_at_addr #04 [<0xffffffffc200dc22>] in populate_anon_va #05 [<0xffffffffc200fc92>] in populate_va #06 [<0xffffffffc2056380>] in sys_populate_va #07 [<0xffffffffc20593c9>] in syscall #08 [<0xffffffffc2059584>] in run_local_syscall #09 [<0xffffffffc2059ab9>] in prep_syscalls #10 [<0xffffffffc20ab29a>] in sysenter_callwrapper Entering Nanwan's Dungeon on Core 2 (Ints on): Type 'help' for a list of commands.