2019/05/12 03:56:13 fuzzer started 2019/05/12 03:56:13 dialing manager at 127.0.0.1:43643 2019/05/12 03:56:13 syscalls: 212 2019/05/12 03:56:13 code coverage: support is not implemented in syzkaller 2019/05/12 03:56:13 comparison tracing: support is not implemented in syzkaller 2019/05/12 03:56:13 extra coverage: support is not implemented in syzkaller 2019/05/12 03:56:13 setuid sandbox: support is not implemented in syzkaller 2019/05/12 03:56:13 namespace sandbox: support is not implemented in syzkaller 2019/05/12 03:56:13 Android sandbox: support is not implemented in syzkaller 2019/05/12 03:56:13 fault injection: support is not implemented in syzkaller 2019/05/12 03:56:13 leak checking: support is not implemented in syzkaller 2019/05/12 03:56:13 net packet injection: support is not implemented in syzkaller 2019/05/12 03:56:13 net device setup: support is not implemented in syzkaller 03:56:14 executing program 0: change_to_m() pop_ctx(&(0x7f0000000000)="969bc9460ff7015f15ebf870ebad9ba853525a4df5d1a92be495f24c5f279df0640937a186272d6c05ff52945f5ee62614196f8ba7fb02fd6b02315022e30ef61e9bf69031a2a2e7736601e1e1b55f1cdd90bddaccb956b21282a1625de11cf0f81dcd6714228f743b845af29a3a93cef5d9120e68aa91316b42dc797a9b078622e330e46febd45c88c681be86ee5031b9d5773cef6cc597d3b141927660764e651c2479c36899cfc5728c74eb03a4f0dd9233b16601f05c2da458fd91803e4189e0d86a6894e4f717e9f3b04e3e59cd3c58276b3b64f616") openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f0000000180)='/prof/kprintx\x00', 0xe, 0x3, 0x0) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) r0 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) getvcoreid() unlink(&(0x7f0000000240)='./file0\x00', 0x8) r1 = openat$net_arp(0xffffffffffffff9c, &(0x7f0000000280)='/net/arp\x00', 0x9, 0x3, 0x0) fwstat(r0, &(0x7f00000002c0)=""/4096, 0x1000, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f00000012c0)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000001300)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) fcntl$F_SYNC(r1, 0x65) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000001340)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) access(&(0x7f0000001380)='./file1\x00', 0x8, 0x4) wstat(&(0x7f00000013c0)='./file0\x00', 0x8, &(0x7f0000001400)=""/4096, 0x1000, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000002400)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000002440)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000002480)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f00000024c0)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f0000002500)='/dev/time\x00', 0xa, 0x3, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000002540)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f0000002580)='/dev/user\x00', 0xa, 0x3, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f00000025c0)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000002600)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000002640)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000002680)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f00000026c0)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000002700)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) 03:56:14 executing program 2: umask(0x5885) r0 = openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0xd, 0x1, 0x0) r1 = openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000080)='/dev/stdin\x00', 0xb, 0x3, 0x0) r2 = openat$dev_pid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/pid\x00', 0x9, 0x1, 0x0) fcntl$F_GETFD(r0, 0x1) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0xd, 0x1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000200)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) write(r2, &(0x7f0000000280)="e91a9bf4e69ed237bcbb338c89f48074bf0befddcad54aa1d16a671e59617fcfcd4cb9ef493c26fdcd96caa46b13fd6d50910a1a2bca2b6043904a0a90918a99a8522fb8718ae1bc2c75e7c7322ef6141bc069fba543fb5e8aa9433483c1430d6cb59aa3ac632c6fe7414f5c0bbc7736fb2c9c81e5554b17542c175336900044a3589a2946d369a6cd9c3f2805b7", 0x8e) nmount(r1, &(0x7f0000000340)='./file0\x00', 0x8, 0x1) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000400)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000500)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/status\x00', 0x12, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000600)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000700)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sysstat\x00', 0xd, 0x3, 0x0) 03:56:14 executing program 1: r0 = openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/killkid\x00', 0xd, 0x3, 0x0) r1 = openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) r2 = openat$dev_sysstat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sysstat\x00', 0xd, 0x3, 0x0) r3 = openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x8010, r3, 0x9) llseek(r0, 0x100000000, 0x8, &(0x7f0000000140), 0x1) r4 = openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000180)='/prof/kpctl\x00', 0xc, 0x3, 0x0) r5 = openat$prof_kptrace(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) r6 = openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/args\x00', 0x10, 0x3, 0x0) tap_fds(&(0x7f00000007c0)=[{r4, 0x3, 0x200, 0x400, &(0x7f0000000300)={&(0x7f0000000280)="7c6d920d526c6f33932cdef890f1f6a8e857ca7c47c5574a23d6cebc92f8a8f2f3c28987c60ca0abb3e3e379ce6d73d2036e28795e574c0c098e6f126208b9ac56fed4a33ee6902c22055923bba03809", 0x2, 0x0, 0x4, 0xffffffffffff5e15, 0xfff}}, {r1, 0x2, 0x200, 0x6, &(0x7f00000003c0)={&(0x7f0000000340)="d932292fb1920f681ebe88cf70b4ea57f818a2307487225b9783f762eabeb83e3b2c21e1deb596e160da3220bb26578a5ab825357e0dfa7d66a0062bbf357e2d52b54dc06ed4c233f9505670640d10cb", 0x7fff, 0x0, 0x7, 0xdbcf, 0x6f8c}}, {r5, 0x3, 0x4, 0x8, &(0x7f0000000480)={&(0x7f0000000400)="f3d67ec4c17b0299227690c3aba26a27a194c9fb792789226ee60ef8c63923e5ceb34a4c9c0da27d1b8304a4df3cdc7cc41ba043608ea08500d62cd61ffa7467446b526615240689e3d29703f4062ffd", 0x40, 0x0, 0x6, 0x10001, 0x3}}, {r5, 0x1, 0x400, 0x6, &(0x7f0000000540)={&(0x7f00000004c0)="824050049c4a2ab91f7a9b6618c6521123e02bd47ca5cce551863523f4684e6bec95b4843c61407463251bedc3a8fb97bb5de6030b0fd06b7c22d89cdb2c8cf5caa86c153b0ec25e6ae0b3799db98d55", 0x9, 0x1, 0x7, 0x3ff, 0x40}}, {r0, 0x3, 0x0, 0x64, &(0x7f0000000600)={&(0x7f0000000580)="e6923644c19a202f03b2dcf961c920ede23fb11d88dbc11f4c1cca596ee0b59f3d85c5ae146534b1843efc4ee59c867b10fc6e78f693de5bb24fc1714a99eb15f66e8eace4c3b483d4a5fa9846e36a21", 0x9, 0x1, 0x4cd59ee4, 0x3, 0x1000}}, {r2, 0x3, 0x62, 0x0, &(0x7f00000006c0)={&(0x7f0000000640)="d02e45f781145ace4c5a920c5d8cc2d926f265ec6991f8b40c4dd9d5c88786898fba1b2567abd549436f2b92c471adebb45bde0858aff7dbbc9bd6e9699b565f8cf7eb3e5332b12e83ae55ad990f19ea", 0x9, 0x1, 0x7f, 0xfffffffffffff96f, 0x3}}, {r2, 0x1, 0x310, 0x1, &(0x7f0000000780)={&(0x7f0000000700)="1215aa4d4b3a6112a286996103f7184e82b9009d68358b54e63296218196eb8c707a56912ad949728c22acc162c8f811a8c61925ba97d42825e0d48eadaddee045b2f596c6dfe1471074feae28ec521b", 0x5, 0x1, 0x5, 0x7f, 0x3}}], 0x7) fcntl$F_DUPFD(r4, 0x0, r6, 0x1) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f00000008c0)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000900)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000980)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$dev_sysname(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000a00)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) tap_fds(&(0x7f0000000bc0)=[{r2, 0x3, 0x60, 0x6, &(0x7f0000000ac0)={&(0x7f0000000a40)="e40a31c3567b7dde2ea46a754eae0e70838685868618e8093e737c34ece42917b2d5e7c413da9980365a00a041d67302321ff97f67b989b55119e692880f97b0e9b10c1728b7246324a73933a2f60481", 0x6, 0x1, 0x8, 0x20, 0x9}}, {r1, 0x3, 0x30, 0x8001, &(0x7f0000000b80)={&(0x7f0000000b00)="f44a59336a44c294070fd5dc590defe85f4b5e102bb9c1687af57291b78a9d66a7a009717a2e48a31270653b655d8021fd5c1cc7da47b8c049481c55ce7e1d45e1dacef09da818097d916baae0b50523", 0x30, 0x1, 0x5, 0x100000001, 0xa37}}], 0x2) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/self/user\x00', 0x10, 0x1, 0x0) r7 = openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000c80)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000cc0)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) llseek(r7, 0x7ff, 0x7, &(0x7f0000000d00), 0x2) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000d40)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000e00)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000e40)='/proc/self/wait\x00', 0x10, 0x1, 0x0) 03:56:14 executing program 3: nunmount(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='./file0\x00', 0x8) mkdir(&(0x7f0000000080)='./file0\x00', 0x8, 0x101) readlink(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)=""/4096, 0x1000) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000001100)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000001140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) r0 = proc_create(&(0x7f0000001180)='.\x00', 0x2, &(0x7f00000011c0)='*&}.\x00', 0x5, 0x1) provision(r0, 0x0, 0x32) symlink(&(0x7f0000001200)='./file0\x00', 0x8, &(0x7f0000001240)='./file0\x00', 0x8) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000001280)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) rename(&(0x7f00000012c0)='./file0\x00', 0x8, &(0x7f0000001300)='./file0\x00', 0x8) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000001340)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) symlink(&(0x7f0000001380)='./file0\x00', 0x8, &(0x7f00000013c0)='./file0\x00', 0x8) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000001400)='/proc/self/user\x00', 0x10, 0x1, 0x0) exec(&(0x7f0000001440)='./file0\x00', 0x8, &(0x7f0000001480)='/dev/osversion\x00', 0xf) symlink(&(0x7f00000014c0)='./file0\x00', 0x8, &(0x7f0000001500)='./file0\x00', 0x8) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000001540)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) access(&(0x7f0000001580)='.\x00', 0x2, 0x80) mkdir(&(0x7f00000015c0)='./file0\x00', 0x8, 0x4) rename(&(0x7f0000001600)='./file0\x00', 0x8, &(0x7f0000001640)='./file1\x00', 0x8) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000001680)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000016c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) chdir(0xffffffffffffffff, &(0x7f0000001700)='./file0\x00', 0x8) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000001740)='/dev/bintime\x00', 0xd, 0x3, 0x0) proc_create(&(0x7f0000001780)='./file0\x00', 0x8, &(0x7f00000017c0)='(\x00', 0x2, 0x0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000001800)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) vmm_ctl$VMM_CTL_GET_EXITS(0x1) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000001840)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000001880)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) vmm_poke_guest(0xfffffffff9fef283) nbind(&(0x7f00000018c0)='./file0\x00', 0x8, &(0x7f0000001900)='./file1\x00', 0x8, 0x0) 03:56:14 executing program 7: cache_invalidate() openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r0 = openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000100)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0xa, 0x1, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000200)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000240)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000280)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/mem\x00', 0xf, 0x1, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) openat(r0, &(0x7f0000000400)='./file0\x00', 0x8, 0x80003, 0x4) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000440)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000480)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) change_vcore(0x4000, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sysstat\x00', 0xd, 0x3, 0x0) r1 = openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000540)='/dev/stdin\x00', 0xb, 0x3, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000580)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000600)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat(r1, &(0x7f0000000640)='./file0\x00', 0x8, 0x800, 0x80) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000680)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f00000006c0)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) 03:56:14 executing program 6: openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) r0 = openat$dev_urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0xd, 0x1, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000001100)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000001140)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) proc_create(&(0x7f0000001180)='./file0\x00', 0x8, &(0x7f00000011c0)=',\x00', 0x2, 0x0) r1 = openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000001200)='/dev/osversion\x00', 0xf, 0x1, 0x0) r2 = openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000001240)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000001280)='/dev/random\x00', 0xc, 0x1, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f00000012c0)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000001300)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000001340)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000001380)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f00000013c0)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r1) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000001400)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000001440)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000001480)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f00000014c0)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000001500)='/dev/capuse\x00', 0xc, 0x3, 0x0) fcntl$F_GETFD(r2, 0x1) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000001540)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000001580)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000015c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000001600)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000001640)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000001680)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f00000016c0)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) 03:56:14 executing program 4: r0 = openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000000)='/dev/caphash\x00', 0xd, 0x3, 0x0) abort_sysc_fd(r0) r1 = openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) r2 = openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) nbind(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)='./file0\x00', 0x8, 0x11) read(r2, &(0x7f0000000140)=""/4096, 0x1000) openat$dev_null(0xffffffffffffff9c, &(0x7f0000001140)='/dev/null\x00', 0xa, 0x1, 0x0) tcgetattr(r1, &(0x7f0000001180)) fcntl$F_SETFL(r0, 0x4, 0x8000) openat$dev_stdin(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/stdin\x00', 0xb, 0x3, 0x0) close(r2) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000001200)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000001280)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f00000012c0)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) mkdir(&(0x7f0000001300)='./file0\x00', 0x8, 0x100) proc_create(&(0x7f0000001340)='./file0\x00', 0x8, &(0x7f0000001380)='/dev/stdin\x00', 0xb, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat(r1, &(0x7f0000001400)='./file0\x00', 0x8, 0x10400, 0x80) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000001440)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) nmount(r1, &(0x7f0000001480)='./file0\x00', 0x8, 0x2) mkdir(&(0x7f00000014c0)='./file0\x00', 0x8, 0x4) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000001500)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) r3 = openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000001540)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000001580)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f00000015c0)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) nbind(&(0x7f0000001600)='./file0\x00', 0x8, &(0x7f0000001640)='./file0\x00', 0x8, 0x4) read(r3, &(0x7f0000001680)=""/111, 0x6f) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000001740)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) 03:56:14 executing program 5: r0 = openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) r1 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) r2 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppid\x00', 0xa, 0x1, 0x0) r3 = fcntl$F_DUPFD(r2, 0x0, r0, 0x0) fd2path(r0, &(0x7f00000000c0)=""/200, 0xc8) r4 = proc_create(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)='/net/tcp/0/local\x00', 0x11, 0x1) provision(r4, 0x0, 0x9b) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/user\x00', 0x10, 0x1, 0x0) vmm_add_gpcs(0x8, &(0x7f0000000640)={&(0x7f0000000280)="6ea0eea97a8c35cc01d3cc744f2af05186f7babc36291be1e4bb61f7951ea6ff95c38be108715e7f9f1a8b2ee18142f23813fe53a35036ccf3d18a622a35d011498572654ef3f9ce0809605d78483402cdbe1d7663a8e91f91e3e1b81f78046afe824dba4e0bc257177b79040ed0f1d55e29701d20dc39f8a74d875d9a56c78e1da852308f4e8a5e8033694a3bcd0a9eb8926c2b90271ea6966b6e482e29e59ea1c472135fff7d3ea2ff94d8447fc6a0b5ed8d0c253bb589db52be9cd6849ab19cb9f30d04e993e7f623f01e02f18f8912a2f3e41957e98e89d056ae85f84374dd7ea4abd2e42395285c3ffcf8fc38ec11fefb75e493cc1464", &(0x7f0000000380)="c9400cae1ad691a52182d708fdaa0b97ffd86d40b23c2710d781f99d0da528d7dd996d7f9babb1f59aa37928691f6ca700ed2774c6ad0dd7d39840a9f2a951df2fb0e5", &(0x7f0000000400)="9f41c36020a4424eb551daa3cb09c6e3aa7d4fd6278899da71eef809ac0646d515c364e76d99d557845da3560ec5098e3de24f3a1f5fdcdb020dfd86298dfe4fe7190723c26fea0cce30789cb85db24a803ea7eddb73dc40d75c826d10be89d04b416bcf3105a9860cccbcb87a5ab0539ed2eca12f814f8d6d018e8b6f55958cb7180a0bd8bc60d3e35eedba8934a2c61f39d64942f3a530ad46a005208e167414abe4a2ede9e57c22d5376e0e65865d32ee8dbbbaeeac7ca8f92a8bee0973d2bca5b0c37df5cad17ba98b0315f1783b", &(0x7f0000000500)="b127fe79a530efeb745b90fde59f61cb5acb66fe", &(0x7f0000000540)="cdf57e695fd44846bdff7effd174441629db4897d80d2b9c6c5b33b79d4192434fb79bc8a833c40111c135e0602fd561f9f39c39a9b48d240984a3285c654fc118e85a33fd01924bec7fc85154364e1a7b4a55a38995704553aebabf7a670ae48f407862a1fca38a6a3ef0b641756ff86548ad01e224b0cf31a0bce37d3c9d50a5b670de7ca747aee954efc3e98b3e2b45c02279ddfe0eecdeaff846fdc8917bd28061cd7e05aad8f543037f09e8317eb4b548a6dcf5f7ae8760a8c2270e7ae913aba3d820839fa4d30348835454c551fe1c0caf29f97192ed0bf95ced4054ec79f12ba3f601dee2e1664c5947896e512d26b4b2ab"}) fcntl$F_DUPFD(r1, 0x0, r3, 0x0) r5 = openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f00000006c0)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) fcntl$F_DUPFD(r5, 0x0, r5, 0x1) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000740)='/net/udp/clone\x00', 0xf, 0x3, 0x0) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000780)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) proc_create(&(0x7f00000007c0)='./file0\x00', 0x8, &(0x7f0000000800)='/net/udp/stats\x00', 0xf, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000840)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000900)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000940)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000980)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000009c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000a00)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) proc_destroy(r4, 0x8000000) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000a40)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000a80)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f0000000b00)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) bash-4.3$ Unhandled user trap in vcore context from VC 1 HW TRAP frame (partial) at 0xffffffffc8e380e0 on core 2 rax 0x000000005a5a4e80 rbx 0x000030000001ae90 rcx 0x0000000000000150 rdx 0x000010000000a4c0 rbp 0x000030000001ae80 rsi 0x000010000000a5c0 rdi 0x000000005a5a4f80 r8 0x000000005a5a5a5a r9 0x000000005a5a4e80 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x0000000000410050 r13 0x000010000000a4c0 r14 0x0000000000000004 r15 0x00007f7fffa01f40 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x000000000040fe36 cs 0x------------0023 flag 0x0000000000010202 rsp 0x000030000001ad80 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x000000005a5a4f80 Addr 0x000000000040fe36 is in syz-executor at offset 0x000000000000fe36 VM Regions for proc 37 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b6000): 0x00000005, 0x00000001, 0xffff800004185c20, 0x0000000000000000 01: (0x00000000004b6000 - 0x00000000004b7000): 0x00000005, 0x00000002, 0xffff800004185c20, 0x00000000000b6000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff800004185c20, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 03:56:19 executing program 0: r0 = openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f00000003c0)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) write(r0, &(0x7f0000000040), 0xfffffdab) 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff800004185c20, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 2: Offsets only matter for shared libraries #01 Addr 0x000000000040fe36 is in syz-executor at offset 0x000000000000fe36 #02 Addr 0x000000000041025e is in syz-executor at offset 0x000000000001025e #03 Addr 0x000000000041580d is in syz-executor at offset 0x000000000001580d #04 Addr 0x00000000004080fb is in syz-executor at offset 0x00000000000080fb #05 Addr 0x0000000000414c60 is in syz-executor at offset 0x0000000000014c60 #06 Addr 0x000000000040862a is in syz-executor at offset 0x000000000000862a #07 Addr 0x0000000000404019 is in syz-executor at offset 0x0000000000004019 #08 Addr 0x000000000041498c is in syz-executor at offset 0x000000000001498c #09 Addr 0x0000000000414991 is in syz-executor at offset 0x0000000000014991 kernel panic at kern/src/arena.c:723, from core 2: Arena kpages, request for zero Stack Backtrace on Core 2: #01 [<0xffffffffc200a47c>] in backtrace #02 [<0xffffffffc2009c15>] in _panic #03 [<0xffffffffc200252f>] in arena_alloc #04 [<0xffffffffc2046575>] in kpages_alloc #05 [<0xffffffffc200a96e>] in kmalloc #06 [<0xffffffffc200aa2f>] in kzmalloc #07 [<0xffffffffc2039831>] in parsecmd #08 [<0xffffffffc2016dfe>] in ipwrite #09 [<0xffffffffc2040699>] in rwrite #10 [<0xffffffffc20408eb>] in syswrite #11 [<0xffffffffc2059449>] in sys_write #12 [<0xffffffffc2059fa9>] in syscall #13 [<0xffffffffc205ab58>] in run_local_syscall #14 [<0xffffffffc205b099>] in prep_syscalls #15 [<0xffffffffc20ac872>] in sysenter_callwrapper Entering Nanwan's Dungeon on Core 2 (Ints on): Type 'help' for a list of commands.