2019/04/30 17:57:34 fuzzer started 2019/04/30 17:57:35 dialing manager at 127.0.0.1:35507 2019/04/30 17:57:35 syscalls: 212 2019/04/30 17:57:35 code coverage: support is not implemented in syzkaller 2019/04/30 17:57:35 comparison tracing: support is not implemented in syzkaller 2019/04/30 17:57:35 extra coverage: support is not implemented in syzkaller 2019/04/30 17:57:35 setuid sandbox: support is not implemented in syzkaller 2019/04/30 17:57:35 namespace sandbox: support is not implemented in syzkaller 2019/04/30 17:57:35 Android sandbox: support is not implemented in syzkaller 2019/04/30 17:57:35 fault injection: support is not implemented in syzkaller 2019/04/30 17:57:35 leak checking: support is not implemented in syzkaller 2019/04/30 17:57:35 net packet injection: support is not implemented in syzkaller 2019/04/30 17:57:35 net device setup: support is not implemented in syzkaller 17:57:35 executing program 0: r0 = openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) fcntl$F_GETFD(r0, 0x1) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000040)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000080)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000100)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) r1 = openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000200)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) r2 = openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000340)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000380)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) r3 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000480)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) getvcoreid() tcgetattr(r2, &(0x7f00000004c0)) nmount(r1, &(0x7f0000000500)='./file0\x00', 0x8, 0x12) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) fwstat(r3, &(0x7f0000000580)=""/144, 0x90, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000640)='/net/udp/clone\x00', 0xf, 0x3, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000680)='/net/udp/clone\x00', 0xf, 0x3, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f00000006c0)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0xa, 0x1, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) 17:57:35 executing program 1: r0 = proc_create(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='[(&@/[\x00', 0x7, 0x0) notify(r0, 0x1b, &(0x7f0000000100)={0x19, 0x6, 0x8001, &(0x7f0000000080)="ab7dca30543d51953bbbb63922ec6b2b9bc8de850ccb9e19a8dea6b87342976aac597a2858cb8f04975600236bb08159f73b4f9b913f449e68c350292cfe9116dd5898e8c40b11af818a8330b07ea138", 0x2}) proc_create(&(0x7f0000000140)='./file0\x00', 0x8, &(0x7f0000000180)='\'\x00', 0x2, 0x1) stat(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)) proc_create(&(0x7f0000000280)='./file0\x00', 0x8, &(0x7f00000002c0)='[(&@/[\x00', 0x7, 0x0) r1 = openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) send_event(&(0x7f00000003c0)={&(0x7f0000000340)="93551d9fa5306a0f462f3e21e5ae3c1ec94c068f9a9d9f0371cf44891eabd22b4d67456106bca1861fedc78d293a0bf6878060aeb7da954eaf4e37a65325c5107bb8e6dfaa341d3cd865c13f79e5f026", 0x80000001, 0x0, 0xfffffffffffffc01, 0x1f, 0x4}, &(0x7f0000000500)={0x7, 0x1, 0x10001, &(0x7f0000000400)="dc71c41715599ee8229a2cfd3b6ccf700399ecad3e13702691b5e1c08c00c27642f08073f68c1be7fb2ba359c90b2d9d2900b4ae8394a5123c9db5c6e07d2b812a5f6a75b4d97107cc5b485297032250d73818c24d7a8194304d42d97c47b8ea5854546652c2088e7281d76d51d65e3fae457ad9780e5d1d59e20284af0512cefcd9f313db32a4177fe9b8712c5123a3856c17d2bbe1899d08c98b0c752a07a17cd678512f57f6e1f93062e25a9cb905572db94714420e9636cd5449f289fceb72b0d8b721ed363313dcddbc1a87c25eea79c1c23603260abc6e1e0c6cc20691092ade547a56", 0xfffffffffffffffd}, 0x92e7) nunmount(&(0x7f0000000540)='./file0\x00', 0x8, &(0x7f0000000580)='./file0\x00', 0x8) mkdir(&(0x7f00000005c0)='./file0\x00', 0x8, 0x121) mkdir(&(0x7f0000000600)='./file0\x00', 0x8, 0x0) tap_fds(&(0x7f0000000940)=[{r1, 0x3, 0x20, 0x3ff, &(0x7f00000006c0)={&(0x7f0000000640)="9dca985fda2d38bca39f6589223c12e0956be584dc26a6763f906e931d63e81b80f634ba7d16651a20aed6c5dd32672327d7a4cfc1698017be7ac0bd18ffdda6bd01d41248eff0ab5589be738ae86abd", 0x0, 0x0, 0x5, 0x67, 0x80000000}}, {r1, 0x3, 0x41, 0x3, &(0x7f0000000780)={&(0x7f0000000700)="8b82e5b23d50ded78cb8b656f3cf2cb026ae0df05bbb6b0999456de2a9a0754b485db7f3aacd351988bb67612e3fefbdbe73d656b4071867f2a1126d3afa8f04bba8e1d0de0fb978f11a594dd4b9898f", 0x5, 0x0, 0xd7bb, 0x1, 0x2}}, {r1, 0x1, 0x200, 0x7ff, &(0x7f0000000840)={&(0x7f00000007c0)="da22206cb4035bc3854d53fcc02e64177fba9894c36d4576ea3de3b2bba530d7477ba04bc01d039b682d104c6b4014e054491a97eeda7c30794dbee8775e655f94a714d25a562e55d2eae74ecee19e32", 0xffffffffffffffff, 0x0, 0x1, 0x3, 0x5}}, {r1, 0x1, 0x0, 0x3, &(0x7f0000000900)={&(0x7f0000000880)="98519694b5258635081b13dd79091737849875cc446c3e0792b7319a954729d8ca3d7d8685edbb35d595e417f762c7c5ab2525515a2bb4cd9ee1114c2cd3e74be6b11b0ee1175bc3cbd9d3487b3e1b36", 0x9f, 0x0, 0x1f, 0x9, 0x4daa}}], 0x4) proc_create(&(0x7f00000009c0)='./file0\x00', 0x8, &(0x7f0000000a00)='[(&@/[\x00', 0x7, 0x1) lstat(&(0x7f0000000a40)='./file0/../file0\x00', 0x11, &(0x7f0000000a80)) nmount(r1, &(0x7f0000000b00)='./file0\x00', 0x8, 0x10) nbind(&(0x7f0000000b40)='./file0\x00', 0x8, &(0x7f0000000b80)='./file0\x00', 0x8, 0x2) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000bc0)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/pid\x00', 0x9, 0x1, 0x0) chdir(0xffffffffffffffff, &(0x7f0000000c40)='./file0\x00', 0x8) self_notify(0x2, 0x6, &(0x7f0000000d00)={0x3, 0x40, 0x80000000, &(0x7f0000000c80)="3144128c75f4578c505972cfaa7e68cb1c9e788df51303076bc8e2819721306cb613a6e518d156fbf2c61a30a769f44fd3160ba09e07a2ee1693c5e5c4bf293a64768f064cc696d49a9209f4de419a4adf8c5b2fb3e741ef0d", 0x40bc8000000000}, 0x0) r2 = openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/capuse\x00', 0xc, 0x3, 0x0) lstat(&(0x7f0000000d80)='./file0\x00', 0x8, &(0x7f0000000dc0)) proc_create(&(0x7f0000000e40)='./file0\x00', 0x8, &(0x7f0000000e80)='(\x80,.#.\x00', 0x7, 0x0) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000ec0)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/sysname\x00', 0xd, 0x3, 0x0) readlink(&(0x7f0000000f40)='./file0\x00', 0x8, &(0x7f0000000f80)=""/65, 0x41) access(&(0x7f0000001000)='./file0/../file0\x00', 0x11, 0x110) vmm_ctl$VMM_CTL_SET_EXITS(0x2, 0x1) proc_create(&(0x7f0000001040)='./file0\x00', 0x8, &(0x7f0000001080)='-[\x00', 0x3, 0x0) tcgetattr(r2, &(0x7f00000010c0)) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000001100)='/proc/self/args\x00', 0x10, 0x3, 0x0) 17:57:35 executing program 3: r0 = openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) close(r0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/kprintx\x00', 0xe, 0x3, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000280)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f00000002c0)='/net/cs\x00', 0x8, 0x3, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000340)='/net/udp/clone\x00', 0xf, 0x3, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000380)='/net/cs\x00', 0x8, 0x3, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000440)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000480)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000500)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000580)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f00000005c0)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000600)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) 17:57:35 executing program 2: r0 = openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000000)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000140)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) r1 = openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) write(r0, &(0x7f0000000240)="153d40d76f1e6565ad171f340ed1610f0d18df6115487e2a19a3b8e99ed6b3613ac509cf0039dd4de4952023c4704a9d57d195bb55507d487af0fe958360093059e9c7e210a4a826bfc78c927afe37097ac5d32c8fbd13c63e35f75fed152f5cdf1d2884cde54bd7d01057b3f3d8fe4325f6cc9724649f977ab044fe349835f6fd70b823d57b537b8ddbd2efeed2f5bf8ef25f319dd2e21496924a46d18db10e69b3d9c03b2a854c43ab27129075afcd040e01fb01", 0xb5) openat$net_arp(0xffffffffffffff9c, &(0x7f0000000300)='/net/arp\x00', 0x9, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0xd, 0x1, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000400)='/net/ndb\x00', 0x9, 0x3, 0x0) fcntl$F_GETFL(r1, 0x3) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f0000000480)='/prof/kprintx\x00', 0xe, 0x3, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000540)='/net/cs\x00', 0x8, 0x3, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000580)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000640)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000680)='/dev/random\x00', 0xc, 0x1, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000700)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) 17:57:35 executing program 4: r0 = openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) close(r0) r1 = proc_create(&(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000080)=':}[\\\x00', 0x5, 0x1) dup_fds_to(r1, &(0x7f00000000c0)=[{r0}, {r0}, {r0}], 0x3) fcntl$F_SETFD(r0, 0x2, 0x1) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000100)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000180)='/prof/kpctl\x00', 0xc, 0x3, 0x0) r2 = openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000280)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000340)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000380)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000400)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000440)='/dev/pid\x00', 0x9, 0x1, 0x0) r3 = openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000480)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$proc_self_text(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0xa, 0x1, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0xa, 0x1, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000580)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) abort_sysc_fd(r2) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) close(r3) openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000600)='/dev/stdin\x00', 0xb, 0x3, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000680)='/prof/mpstat\x00', 0xd, 0x3, 0x0) 17:57:35 executing program 6: abort_sysc(0x4) r0 = openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000000)='/dev/.empty\x00', 0xc, 0x3, 0x0) r1 = proc_create(&(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000080)='/dev/.empty\x00', 0xc, 0x1) chdir(r1, &(0x7f00000000c0)='./file0\x00', 0x8) chdir(r1, &(0x7f0000000100)='./file0\x00', 0x8) r2 = openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) r3 = openat$dev_time(0xffffffffffffff9c, &(0x7f0000000180)='/dev/time\x00', 0xa, 0x3, 0x0) nunmount(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)='./file0\x00', 0x8) r4 = openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000240)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) proc_create(&(0x7f00000002c0)='./file1\x00', 0x8, &(0x7f0000000300)='\x00', 0x1, 0x0) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) change_vcore(0x9, 0x1) fcntl$F_DUPFD(r3, 0x0, r0, 0x0) llseek(r4, 0x1, 0x0, &(0x7f0000000380), 0x2) r5 = openat$dev_zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0xa, 0x1, 0x0) r6 = openat$dev_null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0xa, 0x1, 0x0) r7 = openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000440)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) r8 = openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) fwstat(r2, &(0x7f00000004c0)=""/47, 0x2f, 0x0) fd2path(r5, &(0x7f0000000500)=""/217, 0xd9) abort_sysc_fd(r0) llseek(r3, 0x5, 0x7fff, &(0x7f0000000600), 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000640)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) tap_fds(&(0x7f0000000b00)=[{r7, 0x3, 0x41, 0x0, &(0x7f0000000700)={&(0x7f0000000680)="c7d59f4e853455bdd6e04405e58a145941b09f1a27cdcf809b0631e4400acd0d69906402c3514f87d19221d5dadc1afb01bb1909ecb19359fc167c3b9fd069df4bc231c654d5a13fdf33cd2b816ae28b", 0x7, 0x0, 0x401, 0x3ff, 0x401}}, {r3, 0x3, 0xc, 0x5, &(0x7f00000007c0)={&(0x7f0000000740)="c111605894c3c70a23b11566d92f2c4683ad418f8d6c918b1fe480f9a70d6864e7c99243c1b6d88e43696c9249322c54d8027d7753a936384b8df5d1ff825220daae1c400ffde1a95911cd862c4af17a", 0x6, 0x0, 0x5, 0x200, 0x100}}, {r5, 0x2, 0x10, 0x9, &(0x7f0000000880)={&(0x7f0000000800)="a61dc6e1d2c97c39c36c9c8c884ad389f16587f4decce195f81df8ae9aef43ef7cc7a0cde46dfbc2478e0ba77a67bad6e41fd3a01d51880ec48663918ad2cc86221943ec4c91ab10f16977ca56cf7bc4", 0x1, 0x1, 0x10001, 0x455, 0x6}}, {r8, 0x3, 0x400, 0x6, &(0x7f0000000940)={&(0x7f00000008c0)="725fb3450acb47be2c3fca2d2bad52fa32260e317f71da9a771a6a37173b90d8da6298bb9046761cb2ef285e307497377a7fbe7fd37e89871c0785c814536370124e97ffbae7f66472cd9646bf80eaeb", 0x3, 0x0, 0x35, 0xd8, 0x51d9}}, {r6, 0x1, 0x10, 0x48a, &(0x7f0000000a00)={&(0x7f0000000980)="66cea8d01e04e0f4e0d39c7e7a0dadcc3a4d9c1356a60b22202f3e5d1330a93b27e957ba07663ba2db9e82e5f02e53bf01d16d976b5606d31948f59dfa2b36a1bd4a1f98c2609a5e8e33525df8179037", 0x2, 0x0, 0x0, 0x8000, 0xffffffffffffffc1}}, {r2, 0x2, 0x100, 0x11d, &(0x7f0000000ac0)={&(0x7f0000000a40)="702f629ad28c5ab50023d53470c099c744a8e8f1ca9b065af4b0382e70195a496ae4671243bdedd32396ba265f1a672354a7bda19ceda913260e79321700f883551a650197800c20f288a83e928f2c12", 0x6, 0x0, 0x4, 0xcab, 0x4}}], 0x6) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000bc0)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000c00)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000c40)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000c80)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000cc0)='/prof/kptrace\x00', 0xe, 0x3, 0x0) 17:57:35 executing program 7: r0 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) r1 = openat$net_empty(0xffffffffffffff9c, &(0x7f00000000c0)='/net/.empty\x00', 0xc, 0x3, 0x0) r2 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sysname\x00', 0xd, 0x3, 0x0) r3 = openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sysctl\x00', 0xc, 0x3, 0x0) r4 = openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) tap_fds(&(0x7f00000004c0)=[{r2, 0x1, 0x80, 0x8, &(0x7f0000000240)={&(0x7f00000001c0)="3716ae067cf95386bf8713507013f137f40357b83eacc836e33f97e34bab424cbc5a719ac50b5cb7680a718b461146e66a0d6dd72aa1e07e95afec99f373d271f76af0a86f18f783f31c1673cfc9d4b2", 0x8, 0x1, 0xff, 0x1, 0x10000}}, {r1, 0x1, 0x10, 0x10000, &(0x7f0000000300)={&(0x7f0000000280)="02d983d1fa9efcf578136b83512a6f53e708984674024f3edcd1dcc7fdfa883b969fbeeb2c4995cf06e4cbee9eef1a35c31e9b398da428eea69711d765db360d88e9b26b53affa235d8869fced564269", 0x9, 0x1, 0x9, 0x80000001, 0x2}}, {r0, 0x2, 0x51dc95a070be9695, 0x4, &(0x7f00000003c0)={&(0x7f0000000340)="0518201ae194277bdbdf37e42bea265cf9b8e9d32d338ba9d2684b8cb1ed23ef1a8b128b78f1cc27292a3c105a1dc977334bf5cceb139b0cbc0c1dad64bf5910566288f6f186d3d82fb29f96cf2dcf46", 0x8, 0x1, 0x17, 0x7, 0x1}}, {r4, 0x1, 0x20, 0xfffffffffffffbff, &(0x7f0000000480)={&(0x7f0000000400)="51c86e94dda94c665fbee5418bcd6233eb47f8ea92596bea022454b343a3216030e8b30704b2c57d9b4b5ba2afaf628b79ae8bb91f0aac4eef195eeda3fd2d1569eb4646b4f3fb48f3b3ce2dbc051fe2", 0xb442, 0x1, 0x101, 0x4, 0x1f}}], 0x4) fcntl$F_GETFL(r3, 0x3) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000005c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000600)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) r5 = openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000740)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) r6 = openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f0000000800)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000840)='/net/ndb\x00', 0x9, 0x3, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000880)='/dev/klog\x00', 0xa, 0x1, 0x0) abort_sysc_fd(r3) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000008c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) change_to_m() openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000900)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) fcntl$F_DUPFD(r6, 0x0, r5, 0x1) fcntl$F_GETFL(r6, 0x3) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000940)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) 17:57:35 executing program 5: cache_invalidate() r0 = openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) r1 = openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) r2 = openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) fd2path(r1, &(0x7f00000000c0)=""/104, 0x68) r3 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sysname\x00', 0xd, 0x3, 0x0) abort_sysc_fd(r1) tap_fds(&(0x7f00000006c0)=[{r3, 0x0, 0x1, 0x0, &(0x7f0000000200)={&(0x7f0000000180)="310c04b83c258aac673c62d09617282b722df4f8e4b1e51ea683d2295f3bab7324c22dfdf2207fdadeb2af84fb83e31e46d63c2352aa6fe48fd9bfaeb91bec701215ecb63403741f00759484550ae90c", 0xfffffffffffff5bb, 0x0, 0x401, 0x80000001, 0x2}}, {r1, 0x1, 0x5b0, 0xb2, &(0x7f00000002c0)={&(0x7f0000000240)="fef86f2d455b2c25e70d46c81ea27375b9c2953c404e12ab72f812d01c58dcec81450d6c474db6b3e477aa3b1d19910992c735e598b678ced5150bb663355ebd43fcac496f96e71e20d64582696db75a", 0x100000000, 0x1, 0x8, 0x9, 0x5}}, {r0, 0x1, 0x100, 0x0, &(0x7f0000000380)={&(0x7f0000000300)="766e36c4719c160b3ced1c9dca61caff19e305cee952a91d4659af230a1decabcb97e93f7759cc2cba0ae7d596890309a8508f394ffa617b427424f6f0bae2b796296cd18415171d4e82ef1cad65c8f9", 0x0, 0x1, 0x3, 0x2, 0x5}}, {r0, 0x3, 0x0, 0x100, &(0x7f0000000440)={&(0x7f00000003c0)="c905eba45f78f9c5c8d399821a45d058972a9e4688116c5a4fdbfce8cd75f0535f949b0160874b8f182e1c7c7aa74d6ddb4427dbec2019bf6503432310df8aef5160cc19099670d9f31b84fe9a00f431", 0x1, 0x0, 0x8, 0x3, 0x7}}, {r0, 0x2, 0x220, 0x200, &(0x7f0000000500)={&(0x7f0000000480)="7e7a1a1987d0168af5ddac7fd73333000ac91a66954dd3dc3b5584beca5fb73934b06577ee8cff1536d8a0137789e523b098cdef39587db4f1b742178bea4f01285cc2059ad3b900decae6abe12f3ca5", 0x200, 0x1, 0x2, 0x4}}, {r2, 0x3, 0x0, 0x100000001, &(0x7f00000005c0)={&(0x7f0000000540)="d667d89dc7f4f2911e9efd9eb7a73938e97a7e1e27b2e1b443ac9806fb045b0b499ebc1c96c26438e75494ed0a7ceef3faf67fe1c1c81494c8b1f4e096059cd75023ad9202be3a8eb9c0d4f6a7659e70", 0x0, 0x0, 0x6, 0x80000000000000, 0x80000000}}, {r0, 0x3, 0x400, 0x3ff, &(0x7f0000000680)={&(0x7f0000000600)="28e0e3c9590899eb53352c7cfb28b6373219daa8522ac245365002081615807d9cf40b16d8e79ef454b17ed80f7932cfe4a5e6336187a3e153cfac96d7d3ac01757619ca2b0607d54a7dc88eb6a58346", 0x9b09, 0x0, 0xf3, 0x4, 0x1}}], 0x7) openat$dev_capuse(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/capuse\x00', 0xc, 0x3, 0x0) readlink(&(0x7f0000000800)='./file0\x00', 0x8, &(0x7f0000000840)=""/119, 0x77) r4 = openat$proc_self_fd(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/fd\x00', 0xe, 0x1, 0x0) read(r4, &(0x7f0000000900)=""/184, 0xb8) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f00000009c0)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) r5 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/sysname\x00', 0xd, 0x3, 0x0) r6 = proc_create(&(0x7f0000000a40)='./file0\x00', 0x8, &(0x7f0000000a80)='/proc/self/fd\x00', 0xe, 0x0) fchdir(r6, r3) proc_create(&(0x7f0000000ac0)='./file0\x00', 0x8, &(0x7f0000000b00)='/net/tcp/stats\x00', 0xf, 0x0) nmount(r1, &(0x7f0000000b40)='./file0\x00', 0x8, 0x4) write(r5, &(0x7f0000000b80)="ece30125fd3e67a601b1be91b61b552a84706a891431fde4fcc426ca512cbaab6269a7401fa48e56c58b397132cad4bcb4146a49cd0cd507e8d7a917d04bb19e736b45f0619648f9a32f5c4cbdfb32c01ccd5cf4cf41c989b39b6dafc0df364433ddb6f70cd7da5b103291eb3d30217ae5dd9c247bb3eb5d4c4bf243e23b70d8624a64a2b0f8be8a14f7cf0c864fe2014608d0be0b162d47da5001fa0ac0d598435e0e881bc33c22a447f77bf434ed568d05056193c2ab271e0e959474c77e9aebcd", 0xc2) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000c80)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) fd2path(r1, &(0x7f0000000cc0)=""/137, 0x89) r7 = openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000d80)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) r8 = openat$net_arp(0xffffffffffffff9c, &(0x7f0000000dc0)='/net/arp\x00', 0x9, 0x3, 0x0) r9 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000e00)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x112, r9, 0xe837) openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/ppid\x00', 0xa, 0x1, 0x0) tap_fds(&(0x7f0000001000)=[{r7, 0x3, 0x40, 0xfffffffffffffff9, &(0x7f0000000f00)={&(0x7f0000000e80)="d6db2f9af343dd2fb3b90cd1bea9540493502497dd796a77e932b6afbe75f1dfdbc124192ac321c5c7b8de38a308643f4ded96d0fd6c71c9c52b48a30f4396130e294ab8ddbe150d92f1da25ba3d2f79", 0x6, 0x1, 0x3, 0x80, 0x80000000}}, {r8, 0x2, 0x400, 0x8, &(0x7f0000000fc0)={&(0x7f0000000f40)="0eca91db87e31d91bb60bb7b5efd6ebe08f024f1d699051346305ac2deae59de8c2510cf52fb8ce5ebcfa6b3c6660738d44638a9de88a6b177e744741472be7ab066730b85d993dfd005df5126061902", 0x8001, 0x1, 0xfffffffffffffffe, 0x2, 0xd9b}}], 0x2) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000001040)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000001080)='/dev/drivers\x00', 0xd, 0x1, 0x0) proc_create(&(0x7f00000010c0)='./file0\x00', 0x8, &(0x7f0000001100)='/proc/self/noteid\x00', 0x12, 0x1) 17:57:36 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hostowner\x00', 0xf, 0x3, 0x0) r0 = openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x314, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) close(r0) 17:57:36 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hostowner\x00', 0xf, 0x3, 0x0) r0 = openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x314, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) close(r0) 17:57:36 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hostowner\x00', 0xf, 0x3, 0x0) r0 = openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x314, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) close(r0) 17:57:36 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hostowner\x00', 0xf, 0x3, 0x0) r0 = openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x314, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) close(r0) 17:57:36 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x314, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) 17:57:36 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x314, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) 17:57:36 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x314, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/killkid\x00', 0xd, 0x3, 0x0) 17:57:36 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x314, 0x1, 0x0) 17:57:36 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hostowner\x00', 0xf, 0x3, 0x0) bash-4.3$ Unhandled user trap in vcore context from VC 2 HW TRAP frame (partial) at 0xffffffffc8e37e20 on core 1 rax 0x0000100000009b78 rbx 0x0000000080000000 rcx 0x0000300000015a00 rdx 0x0000861fffa01e70 rbp 0x000030000001cef0 rsi 0x0000000000000003 rdi 0x000030000001cf00 r8 0x0000000000000000 r9 0x0000000000000000 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x0000861fffa01200 r13 0x0000000000000002 r14 0x0000000080000000 r15 0x00000000006d4160 trap 0x0000000d General Protection gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000000 rip 0x00000000004073fc cs 0x------------0023 flag 0x0000000000010a12 rsp 0x000030000001cec0 ss 0x------------001b err 0x0 (for PFs: User 4, Wr 2, Rd 1), aux 0x0000000000000000 Addr 0x00000000004073fc is in syz-executor at offset 0x00000000000073fc VM Regions for proc 51 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b6000): 0x00000005, 0x00000001, 0xffff8000048a4020, 0x0000000000000000 01: (0x00000000004b6000 - 0x00000000004b7000): 0x00000005, 0x00000002, 0xffff8000048a4020, 0x00000000000b6000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff8000048a4020, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff8000048a4020, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000005d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 1: Offsets only matter for shared libraries #01 Addr 0x00000000004073fc is in syz-executor at offset 0x00000000000073fc #02 Addr 0x000000000040cdbd is in syz-executor at offset 0x000000000000cdbd #03 Addr 0x000000000040ce36 is in syz-executor at offset 0x000000000000ce36 #04 Addr 0x000000000040cf82 is in syz-executor at offset 0x000000000000cf82 #05 Addr 0x00000000004085b8 is in syz-executor at offset 0x00000000000085b8 #06 Addr 0x0000000000400708 is in syz-executor at offset 0x0000000000000708 #07 Addr 0x00000000004088d5 is in syz-executor at offset 0x00000000000088d5 #08 Addr 0x0000000000000000 has no VMR 17:57:40 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3, 0x1036, 0xffffffffffffff9c, 0x0) 17:57:40 executing program 0: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1036, 0xffffffffffffff9c, 0x0) 17:57:40 executing program 3: r0 = openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000000)='/dev/stdout\x00', 0xc, 0x3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x4a2c017ed669df10, r0, 0x0) 17:57:40 executing program 4: r0 = openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) abort_sysc_fd(r0) abort_sysc_fd(r0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000040)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) kernel panic at kern/arch/x86/trap.c:318, from core 3: Proc-ful Page Fault in the Kernel at 0x000000000000001b! HW TRAP frame at 0xfffffff0000e8d30 on core 3 rax 0x0000000000000000 rbx 0xffff800007c61260 rcx 0xfffffff0000e8ea0 rdx 0x000000000000000f rbp 0xfffffff0000e8e38 rsi 0x0000000000000000 rdi 0xfffffff0000e8ea0 r8 0x0000000000000001 r9 0xffffffffc8f655c0 r10 0x0000000000000030 r11 0xffff800007c675a0 r12 0xffff800002176e00 r13 0x0000000020000800 r14 0x0000000000000073 r15 0x0000000000000077 trap 0x0000000e Page Fault gsbs 0xffffffffc8e38340 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc20587f4 cs 0x------------0008 flag 0x0000000000010246 rsp 0xfffffff0000e8df8 ss 0x------------0010 Backtrace of kernel context on Core 3: #01 [<0xffffffffc20587f4>] in sys_readlink #02 [<0xffffffffc2059ea9>] in syscall #03 [<0xffffffffc205aa58>] in run_local_syscall #04 [<0xffffffffc205af99>] in prep_syscalls #05 [<0xffffffffc20ac882>] in sysenter_callwrapper Entering Nanwan's Dungeon on Core 3 (Ints off): Type 'help' for a list of commands.