2019/04/08 11:11:26 fuzzer started 2019/04/08 11:11:26 dialing manager at 127.0.0.1:42287 2019/04/08 11:11:26 syscalls: 212 2019/04/08 11:11:26 code coverage: support is not implemented in syzkaller 2019/04/08 11:11:26 comparison tracing: support is not implemented in syzkaller 2019/04/08 11:11:26 extra coverage: support is not implemented in syzkaller 2019/04/08 11:11:26 setuid sandbox: support is not implemented in syzkaller 2019/04/08 11:11:26 namespace sandbox: support is not implemented in syzkaller 2019/04/08 11:11:26 Android sandbox: support is not implemented in syzkaller 2019/04/08 11:11:26 fault injection: support is not implemented in syzkaller 2019/04/08 11:11:26 leak checking: support is not implemented in syzkaller 2019/04/08 11:11:26 net packet injection: support is not implemented in syzkaller 2019/04/08 11:11:26 net device setup: support is not implemented in syzkaller 11:11:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x8, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x8, 0x2) nbind(&(0x7f0000000080)='./file0\x00', 0x8, &(0x7f00000000c0)='./file0\x00', 0x8, 0x12) r0 = openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/err\x00', 0x11, 0x3, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x8, 0x80, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x8, 0x2) r1 = proc_create(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)='.!\x00', 0x3, 0x0) access(&(0x7f0000000240)='./file0\x00', 0x8, 0x10) access(&(0x7f0000000280)='./file0\x00', 0x8, 0xa0) lstat(&(0x7f00000002c0)='./file0\x00', 0x8, &(0x7f0000000300)) access(&(0x7f0000000380)='./file0\x00', 0x8, 0x20) unlink(&(0x7f00000003c0)='./file0\x00', 0x8) symlink(&(0x7f0000000400)='./file0\x00', 0x8, &(0x7f0000000440)='./file0\x00', 0x8) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0xa, 0x1, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/caphash\x00', 0xd, 0x3, 0x0) r2 = openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/wait\x00', 0x10, 0x1, 0x0) access(&(0x7f0000000540)='./file0\x00', 0x8, 0x10) proc_yield(0x0) provision(r1, 0x0, 0x800) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kmesg\x00', 0xb, 0x1, 0x0) mkdir(&(0x7f00000005c0)='./file0\x00', 0x8, 0x24) symlink(&(0x7f0000000600)='./file0\x00', 0x8, &(0x7f0000000640)='./file0\x00', 0x8) openat(r2, &(0x7f0000000680)='\x00', 0x1, 0x91803, 0x1) openat$dev_empty(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000700)='/net/cs\x00', 0x8, 0x3, 0x0) nbind(&(0x7f0000000740)='./file0/file0\x00', 0xe, &(0x7f0000000780)='./file0\x00', 0x8, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000800)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/segment\x00', 0x13, 0x1, 0x0) exec(&(0x7f0000000880)='./file0/file0\x00', 0xe, &(0x7f00000008c0)='/proc/self/wait\x00', 0x10) 11:11:26 executing program 1: self_notify(0xffffffffffff7fff, 0x7, &(0x7f00000000c0)={0x0, 0x7fffffff, 0x7ff, &(0x7f0000000000)="5e62b142abee01cc65432a3d33dac2f32b4044090d208dfc58183399fe7e32d98d92297c39f494eb0f508eb10eaaaffadb0ad0a12ac9f810c94535f376e8d45d652843c482f54442ef0e94a00f6f1d6957e47b6ca77de764aef0daa97cfde290efb754d41985cc54710166e9a5b421d8151fbf84300947c8c462c50e0c7ef81247a996dfe25941308fb80ff66f86c5bfb1bf6fff0953b802a5", 0x8000}, 0x1) self_notify(0xaa6, 0x0, &(0x7f00000001c0)={0x7, 0x40, 0x3f, &(0x7f0000000100)="f2c035f3e62774706178716366f3cbce2e589603b75b06a8ee7481fce4d06e39e07f7aa0fc50799febb9d4bf909e47a0f43d9f84a3ba587110d32f26edc6bcfdb5efda8b994a9e26eeebf0201e0fbd26734a9769c41c2df3da27ade2b54b9d374325bf747d0ac8fe8cb22be2d895a1ce314182d4cb649cb6e90eab662541b9a05f6249c28fb720b91f04fe9a434d82b734e98fd4f4e0a14c5e9129d4ce1dceb67c5863c89a269a2e4b2decac687a3c", 0x20}, 0x0) send_event(&(0x7f0000000280)={&(0x7f0000000200)="9afebfdd98ac2d76b1dc77ac397196a9349e8504eb15985d038739e28e5aebe2417fa2669d9e6948d6ad2cf42b8fe196494fbf2bb5b221a1a9d1c0f667cfc4b2f8068b7ddaed5119447f8d9713b667b4", 0x3, 0x1, 0x9, 0x0, 0x401}, &(0x7f0000000300)={0x8, 0xfffffffffffffffb, 0x9, &(0x7f00000002c0)="e6d43567cc965a0be4878f62c10a82c40782145e2384177b73a6f31e334ea408d95c427538793bd7c34d5393b77e6e2109d8650773b0", 0x1}, 0x10001) self_notify(0x9, 0x1, &(0x7f0000000380)={0x4, 0x6, 0x4, &(0x7f0000000340)="57b79d5dfdf4902ea636b6f5171f1dd527218454", 0x7f}, 0x1) self_notify(0x81, 0x19, &(0x7f00000004c0)={0xf, 0x0, 0x0, &(0x7f00000003c0)="f136c66d09929ef4a1faa17eb385b7c93f9473087eef417ef4e06075bf99d21c281e637f2e58002a81467af7e45398af3965dfd78b37c06855f1ffaf978815be1498fbd20099c3da5e70f054e7f66c7cbd3f0a628aefe378dfc6fc0eb25a772783c805257b1051844a852eb393ba569c4261091acc91c247c42c9589a9f76c54a8afca45a27ad9d174f9434a5109ab8cebd51e6481994270d607b5d878f0d54180b2c2d5909c4fdc5bea57e0a87001cc87d997bde8c89e860909f4b1e51371b710671f41f8aaec8c5fc53138d68c37", 0xff}, 0x0) vmm_ctl$VMM_CTL_GET_EXITS(0x1) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000540)='/net/ndb\x00', 0x9, 0x3, 0x0) send_event(&(0x7f0000000600)={&(0x7f0000000580)="7ed2c5a9cc4d4bd861de10e06129b78147588474f138ec57f7a455f280b3eb8c0c1bafd089113bc4084ce021acd6e33053a86659169e269ddd4d0c10357038c33e5ac06c4b744c502c97d33d355fe78b", 0x2b40, 0x0, 0xe6, 0x85}, &(0x7f0000000740)={0x6, 0x100000000, 0xe20, &(0x7f0000000640)="198d20666e6e51be7d7975151049dc0a16c7f8142abb7662833e2cfb5a3ba1fdf7d2829d1c5fe7f9676888afaaffbecf7c1088a05b888a79fe192cb86979e4e7b77d3bb0049d0c7381ce7fafde7b141f474bf7aea5f7f2ff845a3f70c0483f1e563e9fcae04c7b6ef40f742355bdee08aaad09cd34967cc446175d79b0b7db52d592668cb452725ca98bb0717447d1bab487b67683d79f472496738a2838a5f6dbbf020aa87ec8066535defede78740b70e5e0c9d8220541714f520c99266bc7832e3dbfabf1f26033ed0c7b8e7e1f288005f8f252cb6b2acb", 0xc46}, 0x8) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/mem\x00', 0xf, 0x1, 0x0) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/mem\x00', 0xf, 0x1, 0x0) send_event(&(0x7f0000000880)={&(0x7f0000000800)="1a4dbbe7a517342817940cb6e5d486f4b0d492010c6bfcbbe4e080c3100138f0a095c76e7c3fc3f46df963e18c437ca7cf9f617cdeb8753edb93e2515f1290cd549db522c258d758dc96a16b3a8cbc1a", 0x9, 0x1, 0x1000, 0x100, 0x8}, &(0x7f0000000900)={0x19, 0xffff, 0x1f, &(0x7f00000008c0)="08e46c5b25", 0x3}, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000940)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000980)='/dev/random\x00', 0xc, 0x1, 0x0) send_event(&(0x7f0000000a40)={&(0x7f00000009c0)="8c1cd288543b1c50a14fb893e29019e5489d418e1f735f4c7526512d8a246f3baa5c0643df4303526a55652a6717d56bb07b211fe527a0948fc15d75c790ac1438afdb7b2b11c4e691a5ab9deea3fa61", 0x1ff, 0x0, 0xc56, 0x4, 0x400}, &(0x7f0000000ac0)={0x5, 0x8, 0xefc6, &(0x7f0000000a80)="fb72ad918d219e1241dc357e223b40", 0x200}, 0xfe00) readlink(&(0x7f0000000b00)='./file0\x00', 0x8, &(0x7f0000000b40)=""/212, 0xd4) r0 = proc_create(&(0x7f0000000c40)='./file0\x00', 0x8, &(0x7f0000000c80)='/net/ndb\x00', 0x9, 0x0) chdir(r0, &(0x7f0000000cc0)='./file0\x00', 0x8) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000d40)='/proc/self/strace\x00', 0x12, 0x1, 0x0) unlink(&(0x7f0000000d80)='./file0\x00', 0x8) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000dc0)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) send_event(&(0x7f0000000e80)={&(0x7f0000000e00)="331c0d7c1fa2e8785abd7fcdf0993d78efab4a04bbb5ac6649a3244353548db56b9cfdbe332ee58a7c2027f6d947d705c70636b0d688449a0d3859d928c3231d3743c00b2e0590e9393cc56b514cfa80", 0xc09, 0x0, 0x10000, 0x700000000000000}, &(0x7f0000000f40)={0xc, 0x8, 0x7, &(0x7f0000000ec0)="37423a305b0e63eacb1bf950ab44d4a7f379ffe2fe7e93efbfc20c8ac083d9316d12e764dcef7128721e45826a541f4928dc0d57a4fab280d504f63e393258837f82d2ff4e57c3fd4164c1355368d60c3858665fe6711f2c4355948d980ccdec12b78842", 0x7fffffff}, 0xffff) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000f80)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000fc0)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000001000)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$dev_config(0xffffffffffffff9c, &(0x7f0000001040)='/dev/config\x00', 0xc, 0x1, 0x0) exec(&(0x7f0000001080)='./file0\x00', 0x8, &(0x7f00000010c0)='/dev/sdctl\x00', 0xb) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000001100)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000001140)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) 11:11:26 executing program 3: openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) r0 = openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) r1 = openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) fcntl$F_DUPFD(r1, 0x0, r1, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) r2 = openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f00000002c0)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) r3 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sysname\x00', 0xd, 0x3, 0x0) r4 = openat$net_cs(0xffffffffffffff9c, &(0x7f0000000380)='/net/cs\x00', 0x8, 0x3, 0x0) abort_sysc_fd(r4) openat$dev_config(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/config\x00', 0xc, 0x1, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) fcntl$F_GETFL(r3, 0x3) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/args\x00', 0x10, 0x3, 0x0) r5 = openat$proc_self_user(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/user\x00', 0x10, 0x1, 0x0) fcntl$F_DUPFD(r2, 0x0, r5, 0x0) read(r0, &(0x7f0000000500)=""/136, 0x88) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) rename(&(0x7f0000000600)='./file0\x00', 0x8, &(0x7f0000000640)='./file0\x00', 0x8) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000680)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) 11:11:26 executing program 4: openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) r0 = openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000080)='/dev/stdin\x00', 0xb, 0x3, 0x0) r1 = openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppid\x00', 0xa, 0x1, 0x0) r2 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x8, 0x100800, 0x43) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/profile\x00', 0x13, 0x1, 0x0) getvcoreid() r3 = proc_create(&(0x7f0000000300)='./file0\x00', 0x8, &(0x7f0000000340)='^\x00', 0x2, 0x0) fchdir(r3, r2) llseek(r1, 0x100, 0x10001, &(0x7f0000000380), 0x1) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0xa, 0x1, 0x0) change_vcore(0x8a9, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000580)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/stderr\x00', 0xc, 0x3, 0x0) r4 = openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f0000000600)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000640)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x8, 0x440, 0x100) tcgetattr(r4, &(0x7f00000006c0)) 11:11:26 executing program 2: populate_va(&(0x7f0000ffe000/0x1000)=nil, 0x5) populate_va(&(0x7f0000ffa000/0x3000)=nil, 0x257) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2) stat(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)) populate_va(&(0x7f0000ffa000/0x1000)=nil, 0x2) munmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000) openat$proc_self_core(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/core\x00', 0x10, 0x1, 0x0) readlink(&(0x7f0000000100)='./file0\x00', 0x8, &(0x7f0000000140)=""/19, 0x13) openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) exec(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)=':\x00', 0x2) r0 = openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000240)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000280)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) readlink(&(0x7f0000000300)='./file0\x00', 0x8, &(0x7f0000000340)=""/101, 0x65) r1 = openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/1/err\x00', 0x11, 0x3, 0x0) unlink(&(0x7f0000000400)='./file0\x00', 0x8) readlink(&(0x7f0000000440)='./file0\x00', 0x8, &(0x7f0000000480)=""/94, 0x5e) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000500)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) stat(&(0x7f0000000540)='.\x00', 0x2, &(0x7f0000000580)) proc_create(&(0x7f0000000600)='./file0\x00', 0x8, &(0x7f0000000640)='-+\x00', 0x3, 0x0) tap_fds(&(0x7f0000000800)=[{r0, 0x2, 0x20, 0x1, &(0x7f0000000700)={&(0x7f0000000680)="3589aeadd9c08277f8f365a58e44f638afb336418caa5ef28e361f02b42bdfc149d873b78ee5ef93e210216618fd1aea4f05848c41d90146f439e26f68e16077dca2f21f657b7c8e7d697ddd2f9e065c", 0x6, 0x1, 0xad}}, {r1, 0x1, 0x458, 0x0, &(0x7f00000007c0)={&(0x7f0000000740)="f4d92836f68b138b4ec63a0e79b9c3199ce393009add9b8bb985f6ab4bc582ab4d97b2673b91460d646dd8862dd577f41dcfe4d35491bb70804adee7f0fd8bed13c656e9f4290c4a603fa7db1ab991f7", 0x3, 0x1, 0x65e, 0x800, 0x8}}], 0x2) write(r0, &(0x7f0000000840)="fead380fc35d0d12931fd0f08762a10b", 0x10) readlink(&(0x7f0000000880)='./file0\x00', 0x8, &(0x7f00000008c0)=""/143, 0x8f) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000980)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) r2 = proc_create(&(0x7f00000009c0)='./file0\x00', 0x8, &(0x7f0000000a00)='/\x00', 0x2, 0x1) exec(&(0x7f0000000a40)='./file0\x00', 0x8, &(0x7f0000000a80)='\x00', 0x1) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000ac0)='/net/.empty\x00', 0xc, 0x3, 0x0) unlink(&(0x7f0000000b00)='./file0\x00', 0x8) notify(r2, 0x19, &(0x7f0000000c40)={0x33, 0x1de17f63, 0xffffffff, &(0x7f0000000b40)="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", 0xbd}) write(r0, &(0x7f0000000c80)="ee09f56843d6", 0x6) 11:11:26 executing program 6: nbind(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='./file0\x00', 0x8, 0x10) r0 = openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x21000, 0x0) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) proc_create(&(0x7f0000000140)='./file0\x00', 0x8, &(0x7f0000000180)='(,]-\x00', 0x5, 0x1) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) r1 = openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000200)='/dev/drivers\x00', 0xd, 0x1, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000240)='/dev/swap\x00', 0xa, 0x3, 0x0) nbind(&(0x7f0000000280)='./file0\x00', 0x8, &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000340)='/net/ipselftab\x00', 0xf, 0x1, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0xa, 0x1, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) nunmount(&(0x7f0000000400)='./file0\x00', 0x8, &(0x7f0000000440)='./file0\x00', 0x8) r2 = openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) getpcoreid() r3 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat(r1, &(0x7f0000000540)='./file0\x00', 0x8, 0x88040, 0x24) openat(r3, &(0x7f0000000580)='./file0\x00', 0x8, 0x3, 0x0) nbind(&(0x7f00000005c0)='./file0\x00', 0x8, &(0x7f0000000600)='./file0\x00', 0x8, 0x10) nbind(&(0x7f0000000640)='./file0\x00', 0x8, &(0x7f0000000680)='./file0\x00', 0x8, 0x4) r4 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x8, 0x2) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000780)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) fcntl$F_SETFD(r2, 0x2, 0x1) openat$dev_capuse(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/capuse\x00', 0xc, 0x3, 0x0) nmount(r4, &(0x7f0000000800)='./file0\x00', 0x8, 0x10) 11:11:26 executing program 5: r0 = openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/ns\x00', 0xe, 0x1, 0x0) r1 = openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) llseek(r0, 0xecf, 0x1000, &(0x7f0000000080), 0x2) openat$proc_self_status(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/status\x00', 0x12, 0x1, 0x0) r2 = openat$prof_kprintx(0xffffffffffffff9c, &(0x7f0000000100)='/prof/kprintx\x00', 0xe, 0x3, 0x0) r3 = openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) access(&(0x7f0000000180)='./file0\x00', 0x8, 0x80) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000200)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0xa, 0x1, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) r4 = proc_create(&(0x7f00000002c0)='./file0\x00', 0x8, &(0x7f0000000300)='\x00', 0x1, 0x1) dup_fds_to(r4, &(0x7f0000000340)=[{r3}, {r0}, {r2}, {r1}], 0x4) r5 = openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) r6 = openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000440)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) fwstat(r6, &(0x7f0000000500)=""/129, 0x81, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f00000005c0)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) dup_fds_to(r4, &(0x7f0000000640)=[{r0}, {r6}, {r3}, {r5}, {r5}], 0x5) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000680)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000740)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000780)='/dev/swap\x00', 0xa, 0x3, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000007c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) 11:11:26 executing program 7: openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) r0 = openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xa, 0x1, 0x0) r1 = openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/args\x00', 0x10, 0x3, 0x0) r2 = openat$net_ndb(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ndb\x00', 0x9, 0x3, 0x0) r3 = openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000200)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) r4 = openat$dev_kprint(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f00000003c0)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) r5 = openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000400)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) r6 = openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/killkid\x00', 0xd, 0x3, 0x0) r7 = openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000500)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) r8 = proc_create(&(0x7f0000000540)='./file0\x00', 0x8, &(0x7f0000000580)='&/\x00', 0x3, 0x0) dup_fds_to(r8, &(0x7f00000005c0)=[{r4}, {r0}, {r6}, {r7}, {r3}, {r6}, {r1}, {r7}], 0x8) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) write(r7, &(0x7f0000000700)="eb8a07d082aa657b381e3ef815c2f516f1be913aadc3ea124d6d4fc36cb7f77b630581fca64eb71c068a935a8bdfd7b7c4f2ac4bdd620fa12a989d19c3e52916e18c3557a7b255a75db7b526a7b5a95d9d75a52fa411014160e6b752364f24f21c0f38ff3669ea504f78b8c3ea9b05a8965026a06898d9245b21c81249fb0d9461ce8b368678347eb99ea8f845453485155f5ded9a04605b162156fdd72af977f70bfb263cd2ff8488d5c642385ff4e2a5b46fba09a74e05da05703966c7d360cd3de6dafb4a32", 0xc7) write(r2, &(0x7f0000000800)="99230acd955d7866b56a8078e8e59e939fa8798d4fc130d04097240c08a88d1b0246543e6506a59f8cee94ce57c0150a0df6a50e87d116eafc74c8399b030c066672ee2778c2e071169e80e1c03633bf81e3e909f067e982897fb2baeb02922edc85c5c5868a1a99ca1f5af8d5038de256b7466e36dc50c699aa21433deb875b33506518ff199b2ffd51a17f8b4c5ef1fc00", 0x92) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) tcgetattr(r5, &(0x7f0000000900)) bash-4.3$ Which cores are provisioned to which procs: -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 02, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 03, prov: 0(0x0000000000000000) alloc: 35(0xffff80000218b900) kernel panic at kern/src/ns/chan.c:334, from core 1: cclose 0x0000000000000000 Stack Backtrace on Core 1: #01 [<0xffffffffc200a39c>] in backtrace #02 [<0xffffffffc2009b35>] in _panic #03 [<0xffffffffc203187a>] in cclose #04 [<0xffffffffc2033281>] in walk_symlink #05 [<0xffffffffc203326c>] in walk_symlink #06 [<0xffffffffc203326c>] in walk_symlink #07 [<0xffffffffc203326c>] in walk_symlink #08 [<0xffffffffc203326c>] in walk_symlink #09 [<0xffffffffc203326c>] in walk_symlink #10 [<0xffffffffc203326c>] in walk_symlink #11 [<0xffffffffc2032d82>] in walk #12 [<0xffffffffc2033459>] in __namec_from #13 [<0xffffffffc2034043>] in namec #14 [<0xffffffffc203d83d>] in sysbind #15 [<0xffffffffc205670e>] in sys_nbind #16 [<0xffffffffc2059a29>] in syscall #17 [<0xffffffffc205a5d8>] in run_local_syscall #18 [<0xffffffffc205ab19>] in prep_syscalls #19 [<0xffffffffc20ac432>] in sysenter_callwrapper Entering Nanwan's Dungeon on Core 1 (Ints on): Type 'help' for a list of commands.