2020/12/11 15:48:28 fuzzer started 2020/12/11 15:48:28 dialing manager at 127.0.0.1:38107 2020/12/11 15:48:28 syscalls: 212 2020/12/11 15:48:28 code coverage: support is not implemented in syzkaller 2020/12/11 15:48:28 comparison tracing: support is not implemented in syzkaller 2020/12/11 15:48:28 extra coverage: support is not implemented in syzkaller 2020/12/11 15:48:28 setuid sandbox: support is not implemented in syzkaller 2020/12/11 15:48:28 namespace sandbox: support is not implemented in syzkaller 2020/12/11 15:48:28 Android sandbox: support is not implemented in syzkaller 2020/12/11 15:48:28 fault injection: support is not implemented in syzkaller 2020/12/11 15:48:28 leak checking: support is not implemented in syzkaller 2020/12/11 15:48:28 net packet injection: support is not implemented in syzkaller 2020/12/11 15:48:28 net device setup: support is not implemented in syzkaller 2020/12/11 15:48:28 concurrency sanitizer: support is not implemented in syzkaller 2020/12/11 15:48:28 devlink PCI setup: support is not implemented in syzkaller 2020/12/11 15:48:28 USB emulation: support is not implemented in syzkaller 2020/12/11 15:48:28 hci packet injection: support is not implemented in syzkaller 2020/12/11 15:48:28 wifi device emulation: support is not implemented in syzkaller 15:48:28 executing program 1: fcntl$F_SETFL(0xffffffffffffffff, 0x4, 0x100000) openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) r0 = openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000040)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) r1 = openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) r2 = openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x4810, r2, 0x401) r3 = openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) r4 = openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pid\x00', 0x9, 0x1, 0x0) llseek(r1, 0x4, 0x401, &(0x7f0000000280), 0x2) fcntl$F_GETFD(r0, 0x1) read(r2, &(0x7f00000002c0)=""/90, 0x5a) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000340)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) nmount(r4, &(0x7f00000003c0)='./file0\x00', 0x8, 0x1) tap_fds(&(0x7f0000000640)=[{r3, 0x2, 0x10, 0x6, &(0x7f0000000480)={&(0x7f0000000400)="0c6f9f79d4074498417979a8a59176bb6f21a2fc1fdf156bee650cee3cd4f85a2e5d5eebf98b2e280852fed4385e8d36bb029f41d07a1c9a42ab76b458183b170b2d0242ab1951c3c04c3e3bad7236aa", 0x7, 0x1, 0x40, 0x4408, 0x7}}, {r3, 0x1, 0x40, 0x101, &(0x7f0000000540)={&(0x7f00000004c0)="4317a476944c9e1bcc81aeb30b3802a0465ee3df2cd9e67be97b9bdfe6aa7c8825c4208725d102bcd0f034108f67a193b2eac97d99a8a5fa73b99a092816e0601b291319295ac2cbf3389d8e5ee52ead", 0x1, 0x1, 0x7, 0x5, 0x8000}}, {0xffffffffffffffff, 0x2, 0xa8, 0x5, &(0x7f0000000600)={&(0x7f0000000580)="c1f2f6ada1b62a773e7f61ead8424aeda280748d6929c7bf2548a5d01dcf856a28d491f0d39cf75dcbd7bd8be1e1d96bb2ea9b70dcc6e7208dbdecc237aa9cbecc0aed2edc6ab8740530ea6c1bb8b56e", 0x6, 0x1, 0xdb, 0x34f5e9f4}}], 0x3) tcgetattr(r3, &(0x7f00000006c0)) 15:48:28 executing program 0: fcntl$F_SYNC(0xffffffffffffff9c, 0x65) r0 = openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000080)='/prof/kpctl\x00', 0xc, 0x3, 0x0) r1 = openat$dev_empty(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/.empty\x00', 0xc, 0x3, 0x0) nunmount(&(0x7f0000000100)='./file0\x00', 0x8, &(0x7f0000000140)='./file0\x00', 0x8) r2 = fcntl$F_DUPFD(r0, 0x0, r0, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) r3 = openat$prof_kprintx(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/kprintx\x00', 0xe, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) fcntl$F_DUPFD(r1, 0x0, r2, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000300)) llseek(r3, 0x100, 0x0, &(0x7f0000000380), 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f00000003c0)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000400)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000480)='/dev/pid\x00', 0x9, 0x1, 0x0) 15:48:28 executing program 2: read(0xffffffffffffffff, &(0x7f0000000000)=""/97, 0x61) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) r0 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) r1 = openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) close(r1) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000140)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000300)) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000440)='/dev/killkid\x00', 0xd, 0x3, 0x0) tcgetattr(r0, &(0x7f0000000480)) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f00000004c0)='/prof/kprintx\x00', 0xe, 0x3, 0x0) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/text\x00', 0x10, 0x1, 0x0) 15:48:28 executing program 3: nanosleep(&(0x7f0000000000)={0x54, 0xd3a}, &(0x7f0000000040)) change_vcore(0x800, 0x1) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000080)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000100)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f0000000180)='/dev/user\x00', 0xa, 0x3, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/user\x00', 0x10, 0x1, 0x0) r0 = openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/killkid\x00', 0xd, 0x3, 0x0) r1 = openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000005, 0x110, r1, 0x0) r2 = openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000300)='/net/ndb\x00', 0x9, 0x3, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x4, 0x14812, r2, 0x800) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/user\x00', 0x10, 0x1, 0x0) read(r0, &(0x7f0000000380)=""/127, 0x7f) openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hostowner\x00', 0xf, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="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", 0xfe) 15:48:28 executing program 4: llseek(0xffffffffffffff9c, 0x9, 0x4, &(0x7f0000000000), 0x0) wstat(&(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000080)=""/249, 0xf9, 0x0) r0 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) r1 = fcntl$F_DUPFD(r0, 0x0, 0xffffffffffffff9c, 0x1) openat$dev_swap(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) r2 = openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000280)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) fd2path(r1, &(0x7f00000002c0)=""/181, 0xb5) r3 = openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/ns\x00', 0xe, 0x1, 0x0) fcntl$F_SYNC(r2, 0x65) r4 = openat$prof_empty(0xffffffffffffff9c, &(0x7f00000003c0)='/prof/.empty\x00', 0xd, 0x3, 0x0) close(r4) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000400)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) fcntl$F_GETFL(r3, 0x3) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000480)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/.empty\x00', 0xc, 0x3, 0x0) getvcoreid() fwstat(r4, &(0x7f0000000500)=""/179, 0xb3, 0x0) 15:48:28 executing program 5: openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) r0 = openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) r1 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) r2 = openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0xa, 0x1, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x1030, r1, 0x7fff) r3 = openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) fcntl$F_GETFD(r3, 0x1) fcntl$F_GETFL(r0, 0x3) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/random\x00', 0xc, 0x1, 0x0) openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) fcntl$F_GETFL(r2, 0x3) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x36030, 0xffffffffffffff9c, 0x100000000) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hostowner\x00', 0xf, 0x3, 0x0) 15:48:28 executing program 6: tcgetattr(0xffffffffffffff9c, &(0x7f0000000000)) r0 = openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) r1 = openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) tcgetattr(r1, &(0x7f00000000c0)) read(r1, &(0x7f0000000100)=""/207, 0xcf) r2 = openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) abort_sysc_fd(r2) r3 = openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) fcntl$F_SETFL(r3, 0x4, 0x0) r4 = openat$net_log(0xffffffffffffff9c, &(0x7f0000000280)='/net/log\x00', 0x9, 0x3, 0x0) fchdir(0x0, r4) stat(&(0x7f00000002c0)='./file0\x00', 0x8, &(0x7f0000000300)) llseek(r3, 0x1000, 0x1f, &(0x7f0000000380), 0x2) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipselftab\x00', 0xf, 0x1, 0x0) fcntl$F_GETFD(r0, 0x1) chdir(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x8) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) pop_ctx(&(0x7f00000004c0)="863bce1eb891d6c4db3db67297b7437e0abb12af4e53ea891ddb1caa8053c8190cfc640464d20fdb6ebaabb970baa087ff7b369999550b5f442c9e993da2af4d07ea54cddbcf11c9ad5f2b45376092504d2a5875f27a6cb0b299b28d5093e66a01fb78291e19a134949b07e6b1068caf705d2c78c55115ab265da6b7fb94c7d10eafaef09a7962f33a68f81102f87a9df8883beed4b586780f501daf9f3e26804dca7f76e956ef730349881b4b0ddcddae895336d13e9c0e1224360c27f2533879e6e8030ba6a28b85a478b37772ff8942b1126dc7695006") openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) 15:48:28 executing program 7: fcntl$F_SYNC(0xffffffffffffffff, 0x65) r0 = openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) write(r0, &(0x7f0000000040)="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", 0xfb) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000180)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) r1 = openat$dev_caphash(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f0000000200)='/net/arp\x00', 0x9, 0x3, 0x0) r2 = openat$prof_kprintx(0xffffffffffffff9c, &(0x7f0000000240)='/prof/kprintx\x00', 0xe, 0x3, 0x0) fcntl$F_GETFD(r1, 0x1) proc_run(0x0) r3 = openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) close(r3) fwstat(r2, &(0x7f00000002c0)=""/132, 0x84, 0x0) r4 = openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000380)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) write(r4, &(0x7f00000003c0)="34b13e51e7b09199cbe547a36938c9898999fd7ae0dd9eae08dab7a5fbd805ca0992618a51a1b3447c5522631805db76ae3cbda321a027340f6f039e9037afdef17fc10c49062e6dd2819b76dd486b0b100affb6f9e860c02a1b8feab782a7dfa8aa787ab03132e04e8a7abdd5df39f71a40b6730869517419d148795cf87ccf4f1fe4c61d98a3e3cd1603d8334edacc2903135361483df6182837ef8b7217d01780b0d19f27ae5e7511b7f02ba596b7bae6957db8e2c59ff49ca74211ef1ff3bef2a1e9987e6a8fe593d0f536bf1899f92b905326d716ca5496bc5b52a8d936260ce07921a8ee0438f03348523ec0066a53", 0xf2) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) abort_sysc_fd(r0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) tcgetattr(0xffffffffffffffff, &(0x7f00000005c0)) 15:48:29 executing program 1: r0 = openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) tcgetattr(r0, &(0x7f0000000140)) r1 = openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000040)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) fd2path(r1, &(0x7f0000000340)=""/4096, 0x1000) close(r0) r2 = openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) close(r2) r3 = openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) tcgetattr(r3, &(0x7f0000000140)) r4 = openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) fcntl$F_DUPFD(r0, 0x0, r4, 0x0) 15:48:29 executing program 1: fcntl$F_GETFD(0xffffffffffffff9c, 0x1) r0 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) r1 = openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) tap_fds(&(0x7f00000002c0)=[{r0, 0x1, 0x200, 0x2a9e, &(0x7f00000000c0)={&(0x7f0000000040)="ea45d369a2c3084ed4f282b9fc9b865c8bb9d0082f49b4bf2bc984a5e69fd2d07628bb173877e489cc7c1d289bbde125d0ebccf3c83e88ea3c435400ad11241e57548978fefd799dbb544d2b5af8fab9", 0x8d, 0x0, 0xee800, 0xb8, 0x2}}, {r0, 0x0, 0x84, 0x1, &(0x7f0000000180)={&(0x7f0000000100)="75c0f2d81b7653bc4d0508d4cd790870368ea46f510786fe1aa1ef0d3dea3251911b0752a000091516c7a50f7fbd99977218b0b01b4f4e771c5848c5c3b23904118671dfefcd8150aaa7467b52695685", 0x7, 0x1, 0x8, 0x0, 0x9}}, {r1, 0x2, 0x40, 0x7ff, &(0x7f0000000280)={&(0x7f0000000200)="5e51983a4f06b86de61783cb381515e63ab6e0f3a0c15620f51c354118708f90984df6b5c9d85c765812e23e6bcb94646339edebe4d2cb8df1fdf7c56c8a959b77441657bbe94bb012570c57ae9836a5", 0x9, 0x0, 0x7f, 0x3, 0x800}}], 0x3) fcntl$F_GETFL(r1, 0x3) proc_destroy(0x0, 0x2) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) write(r0, &(0x7f0000000380)="60ebdabc89400a7befe541b372816b28b7397b465958acb27e8e83f8277cc4be15bc67248bac87a6bda4351369fbf0a640aebe4d5603900160e5674b2ac0a85b0d877837b596c4c03cedbd61c0c8a850fdd0e0000798aa33a9d9b826c5a2f9bfede886d59ab024652ee8380fc42a9942e3e7171a79964f2c30606078c3094765180149cb7bc2bb6771aec6ad16fd3061436c6753dc15fef676452276a028541bd0f4d03662cea92bca383c89327a1f7fa6e6d5c124c830ebc0c4a7bcec011541b029c04a1271346d48ba3f13d322c2959b238974d634f386e8d70b741045dfad6377bfc1043c8339cecaa446fbafa672", 0xf0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) r2 = openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) fwstat(r2, &(0x7f0000000500)=""/151, 0x97, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/proc\x00', 0x10, 0x1, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/status\x00', 0x12, 0x1, 0x0) r3 = openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f00000006c0)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) read(r3, &(0x7f0000000700)=""/103, 0x67) r4 = openat$net_cs(0xffffffffffffff9c, &(0x7f0000000780)='/net/cs\x00', 0x8, 0x3, 0x0) llseek(r4, 0x43, 0x3, &(0x7f00000007c0), 0x1) fwstat(r0, &(0x7f0000000800)=""/172, 0xac, 0x0) 15:48:29 executing program 1: openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) r0 = openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000001340)='/dev/osversion\x00', 0xf, 0x1, 0x0) fd2path(r0, &(0x7f0000001380)=""/4096, 0x1000) r1 = openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) tcgetattr(r1, &(0x7f0000000140)) r2 = openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) tcgetattr(r2, &(0x7f0000000140)) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kprint\x00', 0xc, 0x1, 0x0) r3 = openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) fcntl$F_GETFD(r3, 0x1) bash-4.3$ kernel panic at kern/arch/x86/trap.c:640, from core 0: Damn Damn! Unhandled trap in the kernel! HW TRAP frame at 0xfffffff0010587a0 on core 0 rax 0x00000000000ee801 rbx 0xffff80000219aac0 rcx 0xffff800003b3a000 rdx 0x0000000000000000 rbp 0xfffffff0010588b8 rsi 0x00000000200000c0 rdi 0xffff80000219aac0 r8 0x0000000000000000 r9 0x0000000000000001 r10 0x000000000000000a r11 0xffff800002c59ce0 r12 0x00000000200000c0 r13 0x00000000000ee800 r14 0xfffffff001058900 r15 0xffff80000219edc1 trap 0x00000000 Divide error gsbs 0xffffffffc8f79b00 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc2007c8e cs 0x------------0008 flag 0x0000000000010202 rsp 0xfffffff001058868 ss 0x------------0000 Backtrace of kernel context on Core 0: #01 [<0xffffffffc2007c8e>] in send_event #02 [<0xffffffffc20086f4>] in fire_tap #03 [<0xffffffffc201686b>] in fire_data_taps #04 [<0xffffffffc20168ba>] in ip_wake_cb #05 [<0xffffffffc203d435>] in qhangup #06 [<0xffffffffc2029902>] in tcpsetstate #07 [<0xffffffffc202f796>] in tcpiput #08 [<0xffffffffc201e902>] in ipiput4 #09 [<0xffffffffc201acc1>] in etherread4 #10 [<0xffffffffc200b994>] in __ktask_wrapper #11 [<0xffffffffc205bfed>] in process_routine_kmsg #12 [<0xffffffffc205597e>] in __smp_idle Entering Nanwan's Dungeon on Core 0 (Ints off): Type 'help' for a list of commands. VM DIAGNOSIS: 15:48:29 Registers: Failed reading regs: dial tcp 127.0.0.1:25223: connect: connection refused Failed reading regs: dial tcp 127.0.0.1:25223: connect: connection refused Failed reading regs: dial tcp 127.0.0.1:25223: connect: connection refused Failed reading regs: dial tcp 127.0.0.1:25223: connect: connection refused