2019/10/30 00:48:06 fuzzer started 2019/10/30 00:48:07 dialing manager at 127.0.0.1:45223 2019/10/30 00:48:07 syscalls: 212 2019/10/30 00:48:07 code coverage: support is not implemented in syzkaller 2019/10/30 00:48:07 comparison tracing: support is not implemented in syzkaller 2019/10/30 00:48:07 extra coverage: support is not implemented in syzkaller 2019/10/30 00:48:07 setuid sandbox: support is not implemented in syzkaller 2019/10/30 00:48:07 namespace sandbox: support is not implemented in syzkaller 2019/10/30 00:48:07 Android sandbox: support is not implemented in syzkaller 2019/10/30 00:48:07 fault injection: support is not implemented in syzkaller 2019/10/30 00:48:07 leak checking: support is not implemented in syzkaller 2019/10/30 00:48:07 net packet injection: support is not implemented in syzkaller 2019/10/30 00:48:07 net device setup: support is not implemented in syzkaller 2019/10/30 00:48:07 concurrency sanitizer: support is not implemented in syzkaller 00:48:07 executing program 0: r0 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000005, 0x10, r0, 0x1) r1 = openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0xd, 0x1, 0x0) r2 = openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sdctl\x00', 0xb, 0x3, 0x0) fcntl$F_GETFD(r2, 0x1) r3 = openat$prof_kptrace(0xffffffffffffff9c, &(0x7f00000000c0)='/prof/kptrace\x00', 0xe, 0x3, 0x0) fstat(r3, &(0x7f0000000100)) r4 = openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/user\x00', 0x10, 0x1, 0x0) r5 = fcntl$F_DUPFD(r4, 0x0, r1, 0x0) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kmesg\x00', 0xb, 0x1, 0x0) r6 = openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000300)='/prof/.empty\x00', 0xd, 0x3, 0x0) close(r6) write(r1, &(0x7f0000000340)="225664199e67983aaf0f53d003e2e9fd3645f99db1b8f69c485d6d9bd3ee86ba58b337ad521f8faa7e96169de20fd68600378f8dec09ae0c8f0bc53e731955f8a9fe4c57b025a68e184f5cab448f41a822be3d3ed7898ae35220beac513dfe8a26afcede229a095fb1d7a250ba53354d37e98c786f079b38763228ad9adcb727ff54e5e86b6afe738cf0f50b5fec3b4423f542a2ff23a745d4fe8afd439bf108dc5cb095baa4b462174e1bafb909f53da965fc88de6cd1f3e0c3d2667e", 0xbd) fcntl$F_SYNC(0xffffffffffffff9c, 0x65) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000400)='/prof/kpdata\x00', 0xd, 0x3, 0x0) r7 = openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000440)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) r8 = fcntl$F_DUPFD(r5, 0x0, r7, 0x0) r9 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000480)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) fwstat(r9, &(0x7f00000004c0)=""/85, 0x55, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000540)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/status\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) read(r8, &(0x7f0000000600)=""/240, 0xf0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/strace\x00', 0x12, 0x1, 0x0) r10 = openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f0000000740)='/net/ipifc/1/err\x00', 0x11, 0x3, 0x0) abort_sysc_fd(r10) 00:48:07 executing program 1: openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) r0 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) r1 = openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/status\x00', 0x12, 0x1, 0x0) fcntl$F_GETFL(r1, 0x3) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) r2 = openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) fcntl$F_SYNC(r2, 0x65) r3 = openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) fcntl$F_GETFD(r3, 0x1) nanosleep(&(0x7f0000000200)={0x5, 0xe7bd}, &(0x7f0000000240)) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000280)='/dev/klog\x00', 0xa, 0x1, 0x0) r4 = openat$dev_sdctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sdctl\x00', 0xb, 0x3, 0x0) r5 = openat(r4, &(0x7f0000000300)='./file0\x00', 0x8, 0x1, 0x20) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000380)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) r6 = proc_create(&(0x7f00000003c0)='./file0\x00', 0x8, &(0x7f0000000400)='\x00', 0x1, 0x1) fchdir(r6, r5) r7 = openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000440)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000480)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f00000004c0)='/prof/kpdata\x00', 0xd, 0x3, 0x0) r8 = openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000500)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) nmount(r8, &(0x7f0000000540)='./file0\x00', 0x8, 0x1b) openat(r7, &(0x7f0000000580)='./file0\x00', 0x8, 0x200, 0x180) r9 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat(r9, &(0x7f0000000600)='./file0\x00', 0x8, 0x100, 0x2) r10 = openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) close(r10) 00:48:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x8, 0x11d) nbind(&(0x7f0000000040)='./file1\x00', 0x8, &(0x7f0000000080)='./file0\x00', 0x8, 0x10) wstat(&(0x7f00000000c0)='./file1\x00', 0x8, &(0x7f0000000100)=""/38, 0x26, 0x0) link(&(0x7f0000000140)='./file1\x00', 0x8, &(0x7f0000000180)='./file1\x00', 0x8) proc_create(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)=']\x00', 0x2, 0x1) unlink(&(0x7f0000000240)='./file0\x00', 0x8) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sdctl\x00', 0xb, 0x3, 0x0) stat(&(0x7f00000002c0)='./file1\x00', 0x8, &(0x7f0000000300)) provision(0x0, 0x0, 0x2) change_vcore(0x80, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x24111, 0xffffffffffffff9c, 0xdf) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) r0 = openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) fcntl$F_SETFD(r0, 0x2, 0x1) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) symlink(&(0x7f0000000480)='./file0\x00', 0x8, &(0x7f00000004c0)='./file0\x00', 0x8) rename(&(0x7f0000000500)='./file0\x00', 0x8, &(0x7f0000000540)='./file1\x00', 0x8) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000580)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000600)='/net/cs\x00', 0x8, 0x3, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0xa, 0x1, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000680)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000700)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/core\x00', 0x10, 0x1, 0x0) r1 = proc_create(&(0x7f0000000800)='./file0\x00', 0x8, &(0x7f0000000840)='\x00', 0x1, 0x0) waitpid(r1, &(0x7f0000000880), 0x1) 00:48:07 executing program 3: r0 = openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/ns\x00', 0xe, 0x1, 0x0) fd2path(r0, &(0x7f0000000040)=""/4096, 0x1000) r1 = openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000001040)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) fd2path(r1, &(0x7f0000001080)=""/122, 0x7a) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000001100)='/proc/self/proc\x00', 0x10, 0x1, 0x0) r2 = openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000001140)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) r3 = openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000001180)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) fcntl$F_DUPFD(r2, 0x0, r3, 0x1) fcntl$F_GETFL(r3, 0x3) r4 = openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f00000011c0)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) r5 = openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000001200)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) fcntl$F_GETFD(r5, 0x1) r6 = openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000001240)='/dev/sysstat\x00', 0xd, 0x3, 0x0) fcntl$F_SETFD(r6, 0x2, 0x2) r7 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000001280)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x10010, r7, 0x6) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f00000012c0)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) r8 = proc_create(&(0x7f0000001300)='./file0\x00', 0x8, &(0x7f0000001340)='[[\\\x8a\x00', 0x5, 0x0) r9 = fcntl$F_DUPFD(0xffffffffffffff9c, 0x0, r4, 0x0) r10 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000001380)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) r11 = openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f00000013c0)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) r12 = openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000001400)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) r13 = openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000001440)='/proc/self/segment\x00', 0x13, 0x1, 0x0) dup_fds_to(r8, &(0x7f0000001480)=[{r3}, {r9}, {r10}, {r11}, {r7}, {r12}, {r13}], 0x7) openat$net_arp(0xffffffffffffff9c, &(0x7f0000001500)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000001540)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) r14 = openat$net_arp(0xffffffffffffff9c, &(0x7f0000001580)='/net/arp\x00', 0x9, 0x3, 0x0) write(r14, &(0x7f00000015c0)="293aed9501792796af6dac361beb542344f41f5c8e0ebe252f7c0fe44bb5bfe9d03aca39337e7e51dd6b50b4008971442af916e0ab4f63f2a5069e19365b842e7f9df13fe2b4b245ad91cdeb2aa24d4a36d8d6f3a2a23cca154a1898151eb2f2951c1640b47639e07a1e0aeed55fba36939f3f27", 0x74) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000001640)='/proc/self/profile\x00', 0x13, 0x1, 0x0) fd2path(r13, &(0x7f0000001680)=""/234, 0xea) 00:48:07 executing program 4: vmm_ctl$VMM_CTL_GET_FLAGS(0x3) r0 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) r1 = openat$net_empty(0xffffffffffffff9c, &(0x7f0000000040)='/net/.empty\x00', 0xc, 0x3, 0x0) fcntl$F_DUPFD(r1, 0x0, r0, 0x1) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) vmm_add_gpcs(0x7, &(0x7f0000000480)={&(0x7f00000000c0)="c9744da9aedeef05e5e18d4137212e6f6bf09edeed03105b0098ac498cdbc29fa55a90706ebec7537284212c734a170e02f6857e4bda3f76645cc70802d70208c127f9c6f06195a43eb998f09aa5262c94fabd03991ab23fd8459ac9aeb84d4d1c39be2b6b74c25b8844300f3a2b7590f2fd7d5129e7683118ff6aad957fd6f6bceea684fe31e5197a8d7084e1621af04fa19f533db1d217abf2f4051d2cad44c1e40a3a3a769488a60fefcbb5bce0792d3187a20df249542a862724f71b04951d7efac0d91662cb3531eef1ad164a4594a3fd43aec3ec25664a310cc3cd649c463284fc5384b63af578b111c715", &(0x7f00000001c0)="bce216562742e5bc662ec73bf33815bcb9e039a4a151116917524e2813c733af8ddc0d143810b6f27e099435f187f0757bef5cff459bb2ba1ec4e637f3c2ca58a520bd68e1df8f22ee3dd85d8a546eefa43c151b81720e7ab9c21a18bd04d39a21ced1782b1fda1b22331fe51fe25686a8642c010a3fa4c745c8267a607b89ce4df6e9c68f2dfb7688ad36f923c2a11b12cbfa83fbbbb10129898e04c14f4b3cb6a06312576b3de2ffedcc71d275a4c11ad8a388ff1e24c4786ed7f705c2c3afe0da92e617a74754f1ba89", &(0x7f00000002c0)="c9913d7a07d9271f64793a429061fb3e77fbc842f0f082d69ce7c4745ec04f3a2def0a7c2a7ce00bf1ad8cbea658446f776f6525a641defbbda6464cc84fb88ab5b44d059fd35216ce4242abe60295b9e87c1b863030397a9d23dd845e6e206b811ec992e5a0533a19e87ebe0c387e211c7319990d21913ef24a33bf3540ac3db69e3646d50474c085c75e5e350dd5f0e5a2610787afd2d0cd2efd44b33121accd47e8", &(0x7f0000000380)="683105bba9636a41148e4e472486523012663f3d738f55023cff20e35fbd65a78ee39f8098b421811131c498a09116d5c372200dc9318b6607ca1073357c91c4a7fba9f77aef887297fe0a9e7e1e71bd3b3ff7695f411d8f4552defd6d0b4606a9722f8b8401f4b4949995c60f8ea3ee42593864e3e7d80f38f2fb66a24c4121d59b5029584956c1da408ace8e5eb9dc4ff8b7e4a291dcd30689305b799f5f1cd667a1cd961102852f31b7e63cef1392", &(0x7f0000000440)="556a66a302072ad66777dc5f479305afcf11cf3274b865ff251b0c40a98d78a0641a8b82d99d1b684ff716ed92d8cc336afb45864adf250973814c9cfc475a7d"}) abort_sysc_fd(r1) openat$dev_kprint(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_log(0xffffffffffffff9c, &(0x7f0000000500)='/net/log\x00', 0x9, 0x3, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f00000005c0)='/prof/kprintx\x00', 0xe, 0x3, 0x0) r2 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000600)='/net/udp/clone\x00', 0xf, 0x3, 0x0) fcntl$F_DUPFD(r2, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x132, 0xffffffffffffff9c, 0x8) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000640)='/dev/random\x00', 0xc, 0x1, 0x0) r3 = openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000680)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/time\x00', 0xa, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) r4 = openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) fcntl$F_GETFD(r4, 0x1) r5 = openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000780)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) write(r5, &(0x7f00000007c0)="85bc7d0ace212bf357d2d534a5e9b739bafa177636b4a89109129faaf35b61ed72ec9a5f832eb106055f988c137e4f1724ba", 0x32) openat(r3, &(0x7f0000000800)='./file0\x00', 0x8, 0x1000, 0x21) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f0000000840)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000880)='/dev/pid\x00', 0x9, 0x1, 0x0) llseek(0xffffffffffffffff, 0x81, 0x20, &(0x7f00000008c0), 0x1) r6 = openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000900)='/net/ndb\x00', 0x9, 0x3, 0x0) close(r6) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x8fb19525e9994876, 0xffffffffffffffff, 0x80000000) 00:48:07 executing program 5: abort_sysc(0x0) r0 = openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) tcgetattr(r0, &(0x7f0000000040)) r1 = openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00', 0x8) r2 = openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sdctl\x00', 0xb, 0x3, 0x0) fcntl$F_DUPFD(r2, 0x0, r1, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f0000000180)='/net/arp\x00', 0x9, 0x3, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0xe, 0x4) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) populate_va(&(0x7f0000ffb000/0x2000)=nil, 0x4) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) nbind(&(0x7f0000000280)='./file0\x00', 0x8, &(0x7f00000002c0)='./file0/file0\x00', 0xe, 0x13) r3 = openat$dev_random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/random\x00', 0xc, 0x1, 0x0) r4 = openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) fcntl$F_DUPFD(r3, 0x0, r4, 0x0) r5 = openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000380)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) fcntl$F_GETFD(r5, 0x1) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/maps\x00', 0x10, 0x1, 0x0) r6 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000400)='/net/udp/clone\x00', 0xf, 0x3, 0x0) fcntl$F_DUPFD(0xffffffffffffffff, 0x0, r6, 0x5) close(r4) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000440)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) r7 = openat$proc_self_maps(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/maps\x00', 0x10, 0x1, 0x0) read(r7, &(0x7f0000000500)=""/238, 0xee) r8 = openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) write(r8, &(0x7f0000000640)="9f6632338a8ff822e7fc416e3fe793b16ce5f001dd9aebfb0fcc7f6718397f481440bb760ecea4b35b8a3127f49849a9dc63b822667f12", 0x37) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000680)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) 00:48:07 executing program 6: r0 = openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000000)='/dev/caphash\x00', 0xd, 0x3, 0x0) r1 = openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) r2 = openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) r3 = openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/ns\x00', 0xe, 0x1, 0x0) tap_fds(&(0x7f0000000400)=[{r0, 0x2, 0x108, 0x5e4, &(0x7f00000000c0)={&(0x7f0000000040)="420fdf6bcf49ff1351f0938e7de5977e3e2bc3f4352ce2d0e86405b2f3c3bb3b0ac77b2c921d254b59381aff9fd27c7f3d2f50b7cd7eba03b50ed83af08ac10c2b7fbedc63c0f7657863e1109b0f9b30", 0x753a4089, 0x0, 0x81, 0x5, 0x7ff}}, {r1, 0x3, 0xc, 0x1dd4, &(0x7f00000001c0)={&(0x7f0000000140)="356b34bac06bc11bcc93d15d997f7d325683ca4638a5557f8beba11a571e653a0758898531ea20e688d786e4b1cfd4f465a9439fd09584f19c2c9c8afd7cf59a0fff18b07ad99ec1f2fe532a0f10de89", 0x1, 0x0, 0x1000, 0x3, 0x9}}, {r2, 0x2, 0x41, 0x1, &(0x7f00000002c0)={&(0x7f0000000240)="9aaf185a02a15742ac2369621ad2f41b4661a360fd9facd1b4813ff8b302deebeda799c2f9343d573ad7ba58f4fefdbf6be0ed486e6aeeef2bc0e2703d069dd3eb19c83b16b79166beade0d8b0ff3ed3", 0x0, 0x1, 0x8, 0x40a3, 0xfffffffffffffffd}}, {r3, 0x1, 0x41, 0x7, &(0x7f00000003c0)={&(0x7f0000000340)="366d968ab08d372a6883d706205e9a392601bf97bc27b694392897649b36aba7668dcce8659f047f110f534fbf2ac0ed501b3ac88ade0ea03375fcad952bb9ac60a24aa24b3f3ffaa8537d547af40d13", 0x710, 0x0, 0x6, 0x4, 0x9}}], 0x4) r4 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) fcntl$F_GETFL(r4, 0x3) fd2path(r4, &(0x7f00000004c0)=""/4096, 0x1000) openat$net_cs(0xffffffffffffff9c, &(0x7f00000014c0)='/net/cs\x00', 0x8, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000001500)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) write(r2, &(0x7f0000001540)="b4aca536aee0c485f9f4f19601b00b660ff358b480ed9ae3eef39734fe75a0f11f42b7d4d25e793ff7effa98a231530f2955fe0148acb257e9123b290982fa4d2ac56f2f3d6a97ec96512ef023cb1c7eec4702226ac2b56e657dbfa6", 0x5c) r5 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f00000015c0)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) r6 = fcntl$F_DUPFD(r1, 0x0, r5, 0xa) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000001600)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000001640)='/prof/.empty\x00', 0xd, 0x3, 0x0) r7 = openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000001680)='/prof/kpctl\x00', 0xc, 0x3, 0x0) fd2path(r7, &(0x7f00000016c0)=""/45, 0x2d) r8 = openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000001700)='/dev/stdin\x00', 0xb, 0x3, 0x0) openat(r8, &(0x7f0000001740)='./file0\x00', 0x8, 0x80, 0x40) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000001780)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) r9 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000017c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) tcgetattr(r9, &(0x7f0000001800)) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000001840)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000001880)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) r10 = openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000018c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) fd2path(r10, &(0x7f0000001900)=""/202, 0xca) r11 = openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000001a00)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) fcntl$F_DUPFD(r3, 0x0, r11, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000001a40)='/prof/kpdata\x00', 0xd, 0x3, 0x0) write(r6, &(0x7f0000001a80)="59c0f19e6b4df03a87230d34865170fb07be013c4674bfd610640bb5d8292a7929cb7c401b0ed75f45904c0ce78d82fe3a3e2417eda41f4924bb32efa62b60e4746e8cc599faebd6d253ad3840dbcbb90a30a10106743703ed6a95563408394c2ff1031a87e35ccbb1ebb4926cb5a563af4498644a84cb3a4d93f1dbc1d84d5b77a04ae00d576a4f315eb2fcfede1a7f22a7f1c61996c1566fa27890f3e5682a626602218e0738c5f2ca5a3a21648f5bf1f20ad02208d4b0134c9a3f06848dd21a856fce", 0xc4) 00:48:07 executing program 7: change_to_m() r0 = proc_create(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='\x00', 0x1, 0x1) chdir(r0, &(0x7f0000000080)='./file0\x00', 0x8) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000100)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) r1 = openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/user\x00', 0x10, 0x1, 0x0) rename(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='./file0\x00', 0x8) r2 = openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000200)='/dev/caphash\x00', 0xd, 0x3, 0x0) fcntl$F_DUPFD(r2, 0x0, 0xffffffffffffffff, 0x0) wstat(&(0x7f0000000240)='./file0\x00', 0x8, &(0x7f0000000280)=""/37, 0x25, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) access(&(0x7f0000000300)='./file0\x00', 0x8, 0x20) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) r3 = openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) fcntl$F_SYNC(r3, 0x65) r4 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000400)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) write(r4, &(0x7f0000000440)="5251606b4cdd4e382474c45bb87bf643029c0bf31119bdf023374f071d985b1bb5b07b8e65fcd0935cd5cfba32a09b8f1eab2caa9eab64590d24c40add225c5db534bfa61e6a190e492e57611897466dd0e4f2526934452bf00c7978f640f6481222fc1e54545258e2aac5dabfb6ad4ba15eb9a0ababac2d680c7a650d77f7a82e2d84cba972fe89743fe4a803c9b8ff412e36b6e4bd4b60e09788255969885f7c7d3e9bbc3a06e9166a3ad3608d49d07a6d1d6e", 0xb4) nunmount(&(0x7f0000000500)='./file1\x00', 0x8, &(0x7f0000000540)='./file0\x00', 0x8) r5 = openat$dev_null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0xa, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000006, 0x11, r5, 0xfffffffffffff26e) r6 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f00000005c0)='/net/udp/clone\x00', 0xf, 0x3, 0x0) fcntl$F_GETFL(r6, 0x3) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000600)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cputime\x00', 0xd, 0x1, 0x0) r7 = openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000680)='/prof/mpstat\x00', 0xd, 0x3, 0x0) fcntl$F_GETFD(r7, 0x1) fcntl$F_GETFD(r1, 0x1) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) wstat(&(0x7f0000000700)='./file2\x00', 0x8, &(0x7f0000000740)=""/217, 0xd9, 0x0) 00:48:08 executing program 0: r0 = openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tc\xfa\x99p\x0e\xae~\xa7\xb9en\x00', 0xffffffffffffff8a, 0x3, 0x0) fcntl$F_SETFD(r0, 0x2, 0x3815da10446e8c8f) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000040)='/dev/stdout\x00', 0xc, 0x3, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pid\x00', 0xffffffffffffff28, 0x1, 0x0) r1 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/de\x00\x10\x00', 0xa, 0x1, 0x0) fd2path(r1, &(0x7f0000000080)=""/106, 0x6a) fd2path(r1, &(0x7f0000000080)=""/28, 0x1c) 00:48:08 executing program 0: chdir(0x0, &(0x7f0000000000)='./file0\x00', 0x8) r0 = openat$dev_random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/random\x00', 0xc, 0x1, 0x0) r1 = proc_create(&(0x7f0000000080)='./file0\x00', 0x8, &(0x7f00000000c0)='/dev/random\x00', 0xc, 0x0) chdir(r1, &(0x7f0000000100)='./file0\x00', 0x8) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x22010, r0, 0x1) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) r2 = openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) exec(&(0x7f0000000200)='./file0\x00', 0x8, &(0x7f0000000240)='/$)-\x00', 0x5) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) poke_ksched(0xffffffffffffffff, 0x0) r3 = proc_create(&(0x7f00000002c0)='./file0\x00', 0x8, &(0x7f0000000300)='/net/tcp/2/data\x00', 0x10, 0x0) poke_ksched(r3, 0x0) r4 = openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000340)='/dev/stdin\x00', 0xb, 0x3, 0x0) r5 = openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/args\x00', 0x10, 0x3, 0x0) r6 = openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) r7 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) r8 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) tap_fds(&(0x7f0000000840)=[{r4, 0x1, 0x6, 0x5, &(0x7f0000000400)={&(0x7f0000000380)="cf0e2489749025dd4bbb63199fc42ed108fffda575687b4673ac8d063804db4f720564bf544dad70ed952c0cd6d69357423fda3ea901d7294bb59aad7449fb5533cf020e20db5d8879b38ba297b9e56a", 0x8, 0x1, 0x1, 0x2, 0x7}}, {r5, 0x2, 0x800, 0x8, &(0x7f0000000500)={&(0x7f0000000480)="3f4ff1448efa169bb90dedc196df843905e032f0b0e053f45f13999ef0bc4163b0add4d0eb12863438a7feab5df448991b2680a92f94ebe6b4adf278312cf3252ece738a7a73f03c1c2a9a04feda95d5", 0xd1, 0x0, 0x2, 0x3, 0xc24f}}, {r6, 0x1, 0xa, 0x1, &(0x7f0000000600)={&(0x7f0000000580)="40c4c1de0c82a19fb9022b78972f95f58ea45e3f857632c7f88891fdd1198dc44d7c8386a61fd14c2da7b316ef97e878b7047010d31f69621358a8c349e3881020e6a99748082842c499bd742c005746", 0xd1, 0x0, 0x10000, 0x1, 0x1}}, {r7, 0x1, 0x385, 0x5, &(0x7f0000000700)={&(0x7f0000000680)="633a4e61eb405603524ab41aa47e0266a902820044cb774c745b5d5efea2543ad1fe5b821016f3460e60555672f102a16e628f81f371ed7ac41376061c59e63055c79657698b60fa80708e69b15ba7d3", 0xbd, 0x1, 0x3, 0xac4, 0x100000001}}, {r8, 0x2, 0x40, 0x1e, &(0x7f0000000800)={&(0x7f0000000780)="c026db699082d26ccc9a53ea726aebe3fd5fef7c32f665537640cb232d502903cc0d09c5cfd203cd4a74f851e923310552dea301f8c9167b355934ee1ae944560b06badac319bf19384d09aa40da1e8f", 0x1, 0x1, 0x1, 0x800, 0xff}}], 0x5) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000900)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000940)='/prof/kpdata\x00', 0xd, 0x3, 0x0) tcgetattr(r6, &(0x7f0000000980)) r9 = openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f00000009c0)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) tcgetattr(r9, &(0x7f0000000a00)) r10 = openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/pid\x00', 0x9, 0x1, 0x0) write(r10, &(0x7f0000000a80)="b43a6f6b6e478e94d7cfb04356d65a072d6e79c3a2343daa7355a4ee5caa1a62433488e226a7676fb3e422cdcdb87389a0bb4aa371b978442b3a767280b4a936685cb89c1cfd65332bf3c0d064ba6b92dc07e2c0a9a0010148ee05d1d1473b7ff85ab48691931ea71df25702d92e45003f3889c25cfcf01917facc09213fd7b021bd1f6bd36ed6e901fc9e766feb4029f9f50c44068894028e", 0x99) r11 = fcntl$F_DUPFD(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x8010, r11, 0x9) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) fd2path(r2, &(0x7f0000000b80)=""/193, 0xc1) 00:48:08 executing program 0: openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) r0 = openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipselftab\x00', 0xf, 0x1, 0x0) openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppid\x00', 0xa, 0x1, 0x0) r1 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppid\x00', 0xfe0c, 0x1, 0x0) fd2path(r1, &(0x7f0000000080)=""/106, 0x6a) r2 = openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) close(r2) fcntl$F_GETFL(r0, 0x3) 00:48:08 executing program 0: r0 = openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) r1 = openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) write(r1, &(0x7f00000000c0)="571ce5331419416af022b221b18d35f5eec0b269cc7ed4b9589978673533c53b314524199a56078e32a623882cc9d599641969b939ffb07b02ca28cd4c81c4359bc1620312421f3a8cfb92", 0x4b) r2 = openat$dev_config(0xffffffffffffff9c, &(0x7f0000000140)='/dev/config\x00', 0xc, 0x1, 0x0) fcntl$F_GETFL(r2, 0x3) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000180)='/net/udp/clone\x00', 0xf, 0x3, 0x0) r3 = openat$dev_sdctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sdctl\x00', 0xb, 0x3, 0x0) fcntl$F_DUPFD(0xffffffffffffffff, 0x0, r3, 0x0) r4 = openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) r5 = openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000240)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) fcntl$F_DUPFD(r4, 0x0, r5, 0x0) r6 = openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000280)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r6) r7 = openat$net_udp_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/net/udp/stats\x00', 0xf, 0x1, 0x0) fcntl$F_DUPFD(r2, 0x0, r7, 0x1) fcntl$F_SYNC(r0, 0x65) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000300)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) r8 = openat$net_log(0xffffffffffffff9c, &(0x7f0000000340)='/net/log\x00', 0x9, 0x3, 0x0) tcgetattr(r8, &(0x7f0000000380)) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000400)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) r9 = openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000440)='/dev/killkid\x00', 0xd, 0x3, 0x0) read(r9, &(0x7f0000000480)=""/156, 0x9c) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000540)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000580)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x1010, r7, 0x3) r10 = openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000640)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) close(r10) 00:48:08 executing program 0: openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/ctl\x00', 0xa, 0x3, 0x0) fcntl$F_SETFL(0xffffffffffffff9c, 0x4, 0x4000) 00:48:08 executing program 0: halt_core(0x9) r0 = openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000000)='/net/ndb\x00', 0x9, 0x3, 0x0) r1 = openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/1/err\x00', 0x11, 0x3, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) fcntl$F_DUPFD(r1, 0x0, r0, 0x0) r2 = openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x8, 0x8000, 0x10) r3 = openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000140)='/dev/swap\x00', 0xa, 0x3, 0x0) r4 = openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) abort_sysc_fd(0xffffffffffffff9c) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/fd\x00', 0xe, 0x1, 0x0) tcgetattr(r2, &(0x7f0000000200)) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) abort_sysc_fd(0xffffffffffffff9c) r5 = openat$net_log(0xffffffffffffff9c, &(0x7f0000000280)='/net/log\x00', 0x9, 0x3, 0x0) r6 = openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f00000002c0)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) r7 = openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) fcntl$F_DUPFD(r6, 0x0, r7, 0x0) write(r4, &(0x7f0000000340)="a37847aa3752f7337ee31456c27a262e84d46366f8452d35164f1c570ef2b4690669a8baa095e6eed81f008ce80cac6c54e5d868dbb7ae5b8d3365c53e1588b6282e294598a9e363d808bece7eaa2fa8b3f88816e60710d2dd3626d7ffd5245773076f98569e4e3ad20b61c3c9b6eaf718ff8cf0c30c7572ca7e1a31364ad0882094a3b4fad3f4a4cb495094f8c51482a8bc3e1e3b512c6fd5", 0x99) abort_sysc_fd(r3) nunmount(&(0x7f0000000400)='./file0\x00', 0x8, &(0x7f0000000440)='./file0\x00', 0x8) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) r8 = openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) r9 = openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000540)='/dev/swap\x00', 0xa, 0x3, 0x0) fcntl$F_DUPFD(r8, 0x0, r9, 0x1) nmount(r5, &(0x7f0000000580)='./file0\x00', 0x8, 0x11) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000600)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000640)='/dev/stdout\x00', 0xc, 0x3, 0x0) 00:48:08 executing program 0: r0 = openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) r1 = openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x8, 0x10000, 0x2) r2 = openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) abort_sysc_fd(r2) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x1a010, r0, 0x10000) read(r0, &(0x7f0000000240)=""/4096, 0x1000) 00:48:08 executing program 0: change_vcore(0x8, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8, 0x3, 0x8) r0 = openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x8, 0x2, 0x52) r1 = openat$proc_self_status(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/status\x00', 0x12, 0x1, 0x0) pop_ctx(&(0x7f0000000100)="bc2dce2069bc35188dad2ea1ec32a18541f92ddd030dc74b39e712ee8131ae179f388762133e177c7de2e925424f69fbc34aca9cdcdde5b2bb1943aaf255dad19e6a9fb3e44d661f782fa48aa6995051d7980b46ae302bfcefd35f6d99a1b69adec30e431b66a580c9b210a28542a05ded0ea550d118417d0bfceb08c20931122458b0a6003533a07dced5e21ee616c49a87c591e69ee915e03d08e0c79845c66c5d040b956197e98ead89d685791861e525249cf7453d5ebb8612ebb335ab7fd49bf7f58b7f1c958a136d33db29e22491eef414935d4902") r2 = openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) close(r2) r3 = openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000240)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) llseek(r3, 0x2, 0x738, &(0x7f0000000280), 0x1) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, 0x8810, 0xffffffffffffffff, 0x3) r4 = openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/pid\x00', 0x9, 0x1, 0x0) fd2path(r4, &(0x7f0000000340)=""/202, 0xca) pop_ctx(&(0x7f0000000440)="e95ab308c0241773c16ecaba63f27a2b2084c77a0673a940d1ea9ef78f77f0c3d8eaf64ad5c0f16ad9716c3bbf418225cfc73823f4655fb639429a022c7e6c92155671446b473dc5d825e8c60e1729b758a87319e6605ee935e1e437cf9da646a90c3fe29c000dacdaf0731eaadaaf92b001d6375f308d9bc81f4e881f0c0532c1f3786558c3dddac4225c4dbf32c7fa01cc0dd82cc45c294ba6671811579d6546390fa52a76fbb3f0f271b79d36a24060d3749040c82a19a4d7f9809f0e72c887c763aa761a2e14b4622e542e88b41f69fdbc9d833edbf3") unlink(&(0x7f0000000540)='./file1\x00', 0x8) r5 = openat$net_empty(0xffffffffffffff9c, &(0x7f0000000580)='/net/.empty\x00', 0xc, 0x3, 0x0) openat(r5, &(0x7f00000005c0)='./file1\x00', 0x8, 0x1, 0x140) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x28011, 0xffffffffffffff9c, 0x0) r6 = openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f0000000600)='/net/ipifc/1/err\x00', 0x11, 0x3, 0x0) openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000640)='/dev/stdin\x00', 0xb, 0x3, 0x0) fcntl$F_SETFL(r6, 0x4, 0x80000) r7 = openat$net_log(0xffffffffffffff9c, &(0x7f0000000680)='/net/log\x00', 0x9, 0x3, 0x0) r8 = openat$dev_cputime(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cputime\x00', 0xd, 0x1, 0x0) r9 = openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000700)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) r10 = openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) dup_fds_to(0xffffffffffffffff, &(0x7f0000000780)=[{r7}, {r1}, {r8}, {r9}, {r6}, {r10}], 0x6) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000800)='/dev/time\x00', 0xa, 0x3, 0x0) r11 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000840)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) fcntl$F_SYNC(r11, 0x65) bash-4.3$ Unhandled user trap in vcore context from VC 1 HW TRAP frame (partial) at 0xffffffffc8f430e0 on core 2 rax 0x000000005a5a4e80 rbx 0x000030000001ae90 rcx 0x0000000000000150 rdx 0x000010000000a4c0 rbp 0x000030000001ae80 rsi 0x000010000000a5c0 rdi 0x000000005a5a4f80 r8 0x000000005a5a5a5a r9 0x000000005a5a4e80 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x0000000000410180 r13 0x000010000000a4c0 r14 0x0000000000000004 r15 0x00007f7fffa01f40 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x000000000040ff66 cs 0x------------0023 flag 0x0000000000010202 rsp 0x000030000001ad80 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x000000005a5a4f80 Addr 0x000000000040ff66 is in syz-executor at offset 0x000000000000ff66 VM Regions for proc 46 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b6000): 0x00000005, 0x00000001, 0xffff800004a35020, 0x0000000000000000 01: (0x00000000004b6000 - 0x00000000004b7000): 0x00000005, 0x00000002, 0xffff800004a35020, 0x00000000000b6000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff800004a35020, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff800004a35020, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 2: Offsets only matter for shared libraries #01 Addr 0x000000000040ff66 is in syz-executor at offset 0x000000000000ff66 #02 Addr 0x000000000041038e is in syz-executor at offset 0x000000000001038e #03 Addr 0x000000000041593d is in syz-executor at offset 0x000000000001593d #04 Addr 0x000000000040822b is in syz-executor at offset 0x000000000000822b #05 Addr 0x0000000000414d90 is in syz-executor at offset 0x0000000000014d90 #06 Addr 0x000000000040875a is in syz-executor at offset 0x000000000000875a #07 Addr 0x0000000000404149 is in syz-executor at offset 0x0000000000004149 #08 Addr 0x0000000000414abc is in syz-executor at offset 0x0000000000014abc #09 Addr 0x0000000000414ac1 is in syz-executor at offset 0x0000000000014ac1 00:48:12 executing program 0: r0 = openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/syscall\x00', 0x19a, 0x1, 0x0) fstat(r0, &(0x7f0000000080)) r1 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppid\x00', 0xa, 0x1, 0x0) fd2path(r1, &(0x7f0000000080)=""/106, 0x6a) r2 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppid\x00', 0xa, 0x1, 0x0) r3 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppid\x00', 0xa, 0x1, 0x0) fd2path(r3, &(0x7f0000000080)=""/106, 0x6a) fd2path(r3, &(0x7f0000000100)=""/106, 0xffffffffffffff7b) fcntl$F_DUPFD(r1, 0x0, r2, 0x1) fcntl$F_GETFD(r1, 0x1) 00:48:13 executing program 2: r0 = openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipselftab\x00', 0xf, 0x1, 0x0) r1 = openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) fcntl$F_DUPFD(r0, 0x0, r1, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x8, 0x80000, 0x40) 00:48:13 executing program 0: openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000040)='/prof/mpstat\x00', 0xd, 0x3, 0x0) r0 = openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000080)='/net/ndb\x00', 0x9, 0x3, 0x0) fcntl$F_GETFD(r0, 0x1) r1 = openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) llseek(r1, 0x3, 0x0, &(0x7f0000000100), 0x3) r2 = openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) write(r0, &(0x7f0000000180)="28a724b3c68203e341ae0282d1d01512db8c321f72887897335948659fcdd6ebbce49b0b1274ee30f2fa8d18dea951998f7dde0821908000614ce65009894b96802661e268d21c69257c3359", 0x4c) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000001, 0xf030, r1, 0x1) abort_sysc_fd(0xffffffffffffffff) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) r3 = openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) r4 = openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sysctl\x00', 0xc, 0x3, 0x0) fcntl$F_SETFL(r4, 0x4, 0x200000) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/mem\x00', 0xf, 0x1, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000300)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000340)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) fcntl$F_GETFL(r2, 0x3) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8, 0x2, 0xb03ad7aec30c5db0) r5 = openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000400)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) llseek(r5, 0x0, 0x7fffffff, &(0x7f0000000440), 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000480)='/dev/caphash\x00', 0xd, 0x3, 0x0) r6 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat(r6, &(0x7f0000000500)='./file1\x00', 0x8, 0x2, 0x200) fd2path(r3, &(0x7f0000000540)=""/218, 0xda) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000640)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000680)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hostowner\x00', 0xf, 0x3, 0x0) r7 = openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) llseek(r7, 0x7, 0x0, &(0x7f0000000740), 0x4) 00:48:13 executing program 4: r0 = openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xa, 0x1, 0x0) read(r0, &(0x7f0000000200)=""/166, 0x83) 00:48:13 executing program 5: munmap(&(0x7f0000000000/0x3000)=nil, 0x3000) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$dev_hostowner(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) 00:48:13 executing program 1: r0 = openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sdctl\x00', 0xb, 0x3, 0x0) close(r0) r1 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppid\x00', 0xa, 0x1, 0x0) fd2path(r1, &(0x7f0000000080)=""/106, 0x6a) fd2path(r1, &(0x7f0000000080)=""/7, 0x7) fd2path(r0, &(0x7f00000011c0)=""/4075, 0xfffffffffffffdff) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000100)='/dev/stderr\x00', 0xc, 0x3, 0x0) 00:48:14 executing program 1: populate_va(&(0x7f0000ffc000/0x2000)=nil, 0x1f) r0 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) r1 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) llseek(r1, 0x5, 0x1ff, &(0x7f0000000080), 0x0) r2 = openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000100)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) abort_sysc_fd(r1) r3 = openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) r4 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) r5 = openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) tap_fds(&(0x7f00000006c0)=[{r0, 0x1, 0x806, 0xf78c, &(0x7f0000000240)={&(0x7f00000001c0)="ef60092222ed3dcf5fe8664088fe64efe617b73f47773f783421b00666c484912f7e20d1a72ac9505258966edf6345713cddad8a6fc58165f309700f4f031e42f166392a6e47d26545435e7d4c332216", 0xfffffffa, 0x0, 0x3, 0xfff, 0x7f}}, {r4, 0x2, 0x42, 0x10000, &(0x7f0000000340)={&(0x7f00000002c0)="23f09cd87ffdc3c6bb09e89e5d609979fb47dd76aa67cab869900f484c3a4f118e2916d5e589e16cd956d00876f3d9d4a618e613b7abef4ccd39639d45c8a7bdbc7e6ef9e7a08eba0c573a576471ad79", 0x101, 0x0, 0x0, 0x1, 0x100000000}}, {r5, 0x0, 0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)="a1e3d7aeccedcb52dc4d7cb21c28af1201db811b18eb28e76f210a03ad7125e31716d695d4f5dce6c9a3334ccc7d3f7d1400470448d162e35c9f164dcc57189a53e62f5fd71e219bff06c5c5610ab36a", 0x6, 0x0, 0x80000000, 0x0, 0xf2f5}}, {r2, 0xca6df5eea323ec44, 0x0, 0x8, &(0x7f0000000500)={&(0x7f0000000480)="b07d1194339c985f98f7eb9c9268f0363831df652c9d3bb601f08a997e2af2a0cbc8382aa05b5c5830c1dc0d36881411c2cf0a59f11766dc202e5f3a8fedcb1a936b714592caeae99e30b2c728327b5e", 0x1ff, 0x1, 0x3, 0x3e5, 0x1000000010000}}, {r3, 0x2, 0x0, 0x4, &(0x7f00000005c0)={&(0x7f0000000540)="ba3c1e92424f13317fc49c97c0809945c191fa00e7e603bd80e2b7aa421f89bc28c32cb7dbcfb530ce83bb20e49215366118c7c9b1a5a6486cba2b723887006bf6d59068fa410ed9ce66ad2ba292b1cf", 0x80000001, 0x1, 0x1, 0x6, 0x6}}, {r3, 0x3, 0x101, 0x101, &(0x7f0000000680)={&(0x7f0000000600)="d832f682e256d79219e592ba0d42c4dd8dcd945ef99f5943fefbeeece94bf3cce4fab206679c3d1dab03e4e10b5f9fddf5762ca494d30c91751e5088eaf5fec5fab2bf4e5a3bf5b5ba86c21e2d758de4", 0x7, 0x0, 0x1, 0x7}}], 0x6) r6 = openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) openat(r6, &(0x7f00000007c0)='./file0\x00', 0x8, 0x11fbb18687b3f95f, 0x1) r7 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000800)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) abort_sysc_fd(r7) tcgetattr(r0, &(0x7f0000000840)) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000880)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f00000008c0)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000900)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) r8 = openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat(r8, &(0x7f0000000980)='./file0\x00', 0x8, 0x10000, 0x0) r9 = openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) r10 = openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat(r10, &(0x7f0000000a40)='./file0\x00', 0x8, 0x4804, 0x4) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000a80)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$net_log(0xffffffffffffff9c, &(0x7f0000000ac0)='/net/log\x00', 0x9, 0x3, 0x0) r11 = openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/sdctl\x00', 0xb, 0x3, 0x0) fcntl$F_GETFD(r11, 0x1) r12 = openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/pid\x00', 0x9, 0x1, 0x0) fcntl$F_DUPFD(r9, 0x0, r12, 0x1) 00:48:15 executing program 6: r0 = openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f0000000000)='/dev/user\x00', 0xa, 0x3, 0x0) close(r0) 00:48:15 executing program 1: syz_execute_func(&(0x7f0000001080)="f30f1ecfc4635149ab76d90000a13e0ffdcbc42151d48a416f0000f2430f5ea3d02c0000cfddca66430f383dec66410fecb270000000c4a2790e82bc000000") r0 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) tcgetattr(r0, &(0x7f0000000040)) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000001140)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) r1 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/sev/p\x8eid\x00', 0xa, 0x1, 0x0) fd2path(r1, &(0x7f0000000080)=""/106, 0x6a) fd2path(r1, &(0x7f0000000080)=""/4096, 0xffffffffffffffea) mmap(&(0x7f0000b2b000/0x1000)=nil, 0x1000, 0x102000006, 0x111, 0xffffffffffffff9c, 0x0) link(&(0x7f00000010c0)='./file0\x00', 0x8, &(0x7f0000001200)='./file0\x00', 0x8) 00:48:15 executing program 7: getvcoreid() openat(0xffffffffffffffff, &(0x7f0000000040)='/', 0x1, 0x8000, 0x150) 00:48:15 executing program 0: openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000000)='/dev/klog\x00', 0xa, 0x1, 0x0) r0 = openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) r1 = openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000100)='/dev/swap\x00', 0xa, 0x3, 0x0) r2 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppid\x00', 0xa, 0x1, 0x0) close(r0) r3 = openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) fcntl$F_GETFL(r3, 0x3) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kmesg\x00', 0xb, 0x1, 0x0) r4 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppid\x00', 0xa, 0x1, 0x0) fd2path(r4, &(0x7f0000000080)=""/106, 0x6a) r5 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppid\x00', 0xa, 0x1, 0x0) fd2path(r5, &(0x7f0000000080)=""/106, 0x6a) fcntl$F_DUPFD(r4, 0x0, r5, 0x1) fd2path(r4, &(0x7f0000000240)=""/91, 0x5b) r6 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) close(r6) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/killkid\x00', 0xd, 0x3, 0x0) close(r2) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/proc\x00', 0x10, 0x1, 0x0) fcntl$F_DUPFD(r1, 0x0, r0, 0x0) 00:48:15 executing program 3: wstat(&(0x7f0000000000)='./file0\x00', 0x1b7, &(0x7f00000000c0)=""/127, 0x7f, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7, 0x4111, 0xffffffffffffff9c, 0x0) 00:48:15 executing program 4: populate_va(&(0x7f0000ffc000/0x4000)=nil, 0x5) r0 = proc_create(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='#x\\\x00', 0x4, 0x1) poke_ksched(r0, 0x0) r1 = openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000080)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) r2 = openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000100)='/dev/stderr\x00', 0xc, 0x3, 0x0) write(r2, &(0x7f0000000140)="83715b6680691400ea1d83156bf539224cfcbfb85dede93ec02f95dce936a336a9", 0x21) poke_ksched(0xffffffffffffffff, 0x0) proc_create(&(0x7f0000000180)='./file1\x00', 0x8, &(0x7f00000001c0)='#x\\\x00', 0x4, 0x0) readlink(&(0x7f0000000200)='./file2\x00', 0x8, &(0x7f0000000240)=""/206, 0xce) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000340)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000480)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/user\x00', 0xa, 0x3, 0x0) r3 = openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) fd2path(r3, &(0x7f0000000540)=""/52, 0x34) r4 = openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000580)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000600)='/net/ndb\x00', 0x9, 0x3, 0x0) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat(r4, &(0x7f0000000680)='./file0\x00', 0x8, 0x10000, 0x40) r5 = openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) tcgetattr(r5, &(0x7f0000000700)) fcntl$F_SETFD(r1, 0x2, 0x0) openat$net_log(0xffffffffffffff9c, &(0x7f0000000740)='/net/log\x00', 0x9, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/strace\x00', 0x12, 0x1, 0x0) 00:48:15 executing program 5: r0 = openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) r1 = openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000100)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) r2 = openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000200)='/dev/klog\x00', 0xa, 0x1, 0x0) r3 = openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/maps\x00', 0x10, 0x1, 0x0) r4 = openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000580)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) r5 = openat$net_cs(0xffffffffffffff9c, &(0x7f0000000680)='/net/cs\x00', 0x8, 0x3, 0x0) tap_fds(&(0x7f0000000780)=[{r0, 0x0, 0x390, 0x4, &(0x7f00000000c0)={&(0x7f0000000040)="d806a922e1411a632341c0beffdc125571e8f539e1e390a0c47905ae431a81f18553669227bf4fe50984dc543c765b00a7bbc86afe0f2ab5d4933a136396e914996c1582463bd501ee24a8142e5a283a", 0x6, 0x1, 0x6, 0x9, 0x8001}}, {r1, 0x1, 0x629, 0x2b, &(0x7f00000001c0)={&(0x7f0000000140)="2fc705efa4d430eb3e7e61652fd9df6993e71bce576c75a7300fcb3604e573f41ce2a140473faa1abd83352210f0896cdb6e2584025e324faa539023de4d21543eba612e539d9d4c74bc2f22f813745d", 0x80000001, 0x1, 0xe451, 0x401, 0x53}}, {r2, 0x0, 0x20, 0xfff, &(0x7f00000002c0)={&(0x7f0000000240)="83921176d179c022a29bd03075bff94b8ab7c3d26d66dc82f0dfef1db051dca9dbc9f02414c5b6e9f3bb2c5d8e2388ff277ad081cf611e78586db37f6dca74ccdbb19759e74741aaec09838f2fa02eb4", 0x6, 0x0, 0x3, 0x6, 0x7}}, {0xffffffffffffffff, 0x1, 0x4, 0xfffffff8, &(0x7f0000000380)={&(0x7f0000000300)="7d4b5bfa44301840fb6d7e461bbc80754f9b620073029bcf7499c9df0664301143e676cf2a947435ad270ac3af694ba13cdd0c344c3d0eba9dcf4393be817c18e777a1cdc98a65f8e09d90ee236f8414", 0x4, 0x1, 0x8, 0x4d8a, 0x6}}, {r0, 0x3, 0x24, 0x2, &(0x7f0000000440)={&(0x7f00000003c0)="c2289e3cf3d461e9f46fb6b674b24a5dede90f624685e3d2a59d043728113939a967a42d80d09a106908cee33d6df037f10388acdc38e0b72945064728a11ad8e3ff807aa4b1a239db7bae743d6da687", 0x9, 0x1, 0x0, 0x1, 0xfffffffffffffffa}}, {r3, 0x3, 0x709, 0x3b1, &(0x7f0000000540)={&(0x7f00000004c0)="2b7e15fe0723935d2a375c82f1fa1a1b5edc574c7954752cb91598f3aacec6d19f157661910ab8c71aebf6155e277f02ee62001f1025c8c960a7fb5394f8516ae88571c0da61eee679523a35ed37549b", 0x6, 0x1, 0x6, 0x5, 0x9}}, {r4, 0x1, 0x2, 0x7ff, &(0x7f0000000640)={&(0x7f00000005c0)="8641e472e596aa5ed14b855ca007c1233fe6ad3a161f046f7869379777e576402492bff8d17f59ee00297ca1a5a59f0ce1b05e0dfedffdc36458774432c0a9cb02c8caa716a2d12a1933c36a0653ebcd", 0x9, 0x1, 0xffff, 0x6, 0x8}}, {r5, 0x2, 0x1, 0xb6ce, &(0x7f0000000740)={&(0x7f00000006c0)="fb805e5cb3252dbee73e82d56a1e829652348bde5378dd2854c66d1f8263f81f8fac3d036e58376549c21695ba11751697e132e72fde6efe360a9adace6a2de5864514bba23f83ac384dd866cb8c7d5a", 0x1, 0x0, 0x51, 0x400, 0x7fff}}], 0x8) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000880)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) r6 = openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f00000008c0)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x18110, r6, 0x10001) r7 = proc_create(&(0x7f0000000900)='./file0\x00', 0x8, &(0x7f0000000940)='/net/cs\x00', 0x8, 0x1) r8 = openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000980)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) fchdir(r7, r8) r9 = openat$dev_empty(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/.empty\x00', 0xc, 0x3, 0x0) fstat(r9, &(0x7f0000000a00)) r10 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000a80)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) fstat(r10, &(0x7f0000000ac0)) unlink(&(0x7f0000000b40)='./file0\x00', 0x8) openat$net_log(0xffffffffffffff9c, &(0x7f0000000b80)='/net/log\x00', 0x9, 0x3, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000bc0)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/self/proc\x00', 0x10, 0x1, 0x0) r11 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000c40)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) r12 = openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000d40)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r13 = openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000f00)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) r14 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000010c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) r15 = openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f00000011c0)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) r16 = openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f00000012c0)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) tap_fds(&(0x7f00000013c0)=[{r11, 0x1, 0x1, 0x4, &(0x7f0000000d00)={&(0x7f0000000c80)="8df9d3e64f2b03d5737aa89a8916186827e57e00bfb951b06954211ba00bd4c5ef3b84f3e89df1d5310ec630f4801a0758aa4e70d4448ac2cd85403340c4af87a087c70d32dd208bd107c729f8e3ce16", 0x7ff, 0x0, 0x0, 0x6, 0x7}}, {r12, 0x2, 0x403, 0xffffffff, &(0x7f0000000e00)={&(0x7f0000000d80)="6c6df0e757340eab7fd6e847bfac73f083e5ac71e781221b3892675a470add5fa24f96dd759b829a2aaf83335c47290ebcceaa77dd167abb634827abea59baa43d1da26dc12bb3d7525c338d3f932fdf", 0x8, 0x1, 0x800, 0x39c8, 0xef}}, {r9, 0x3, 0x4, 0x8, &(0x7f0000000ec0)={&(0x7f0000000e40)="df5d505d2c5e935ec47e3e7c7064312cba3952ffb1c429c0a49c37c23dfd99540c8335a3ed67c4c596d98c8f5cfc355af129e1e0899664166625cbb0180afe37d0778756786c56ad6058f0e26904f364", 0x1ff, 0x1, 0x2, 0xff, 0x58}}, {r13, 0x0, 0x10, 0x1cb391d1, &(0x7f0000000fc0)={&(0x7f0000000f40)="a94be92ef3b305a2f9739258b823c0ae8a39f04a5a222e4d3a2e5ba43f5b9c75c8fce6b20ca33a07637a83d44c69085c25ff0932fa222f718dfdfa31c6c0084823a15fccc3cdda28d8b13755b1966e40", 0x0, 0x1, 0x40, 0xab, 0x81}}, {r10, 0x1, 0x84, 0x1419, &(0x7f0000001080)={&(0x7f0000001000)="1c7a36efa38a8ebaf8662847ce1aaacb2da1349107a2d77debe2b0845b71884c45efdfd607e324ff3b6d9f71972dc9f9b00fe138095ec5ca4a6ea5a4702b20db018a6c7f1c5c8b12f0d26c3815d823c5", 0x101, 0x1, 0x0, 0x7, 0x6}}, {r14, 0x1, 0x12, 0x1, &(0x7f0000001180)={&(0x7f0000001100)="fd09d18df4ffb30d461beead135de901025c980dab7ed7ad48a50029dec34265322f0c7725fc2849df0c3904e680c2a21d5361aa809c0bf9aa189be9046c0eccbdaa240f3684300e3df9551bb346380b", 0x800, 0x0, 0x9, 0x6, 0xfffffffffffffff9}}, {r15, 0x1, 0x180, 0x4, &(0x7f0000001280)={&(0x7f0000001200)="6153788f4d8c02ffaf7edfcbb730a4b9e0fc30afca67bdc7549235958b264412272191ebdc0e787500fe3f95886fedb21f57e9bc162876cc390334a95f5772ee9dacd696dd11a29796f9ba755a87994e", 0x2, 0x0, 0x1f78, 0x1ff, 0x2}}, {r16, 0xfb70dde32845b82e, 0x10, 0x4, &(0x7f0000001380)={&(0x7f0000001300)="c4dbc6b75524b9fbc6ec46453c6064e6ead3c5592a28193fdc1891f055e40d79f91fd20062c412e7f11b1b3b92d004fea85103bd434535ee9b017fc24d1d82c8dde831fda7e055a491932d82d7e35b40", 0x4, 0x1, 0x8, 0x5, 0x81}}], 0x8) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f00000014c0)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000001500)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) 00:48:15 executing program 2: proc_yield(0x0) nanosleep(&(0x7f0000000000)={0x1, 0x2}, &(0x7f0000000040)) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f00000000c0)='/prof/kptrace\x00', 0xe, 0x3, 0x0) r0 = openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) r1 = openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/pid\x00', 0x9, 0x1, 0x0) r2 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f00000001c0)='/net/udp/clone\x00', 0xf, 0x3, 0x0) fstat(r0, &(0x7f0000000200)) r3 = openat$net_arp(0xffffffffffffff9c, &(0x7f0000000280)='/net/arp\x00', 0x9, 0x3, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000300)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) close(r2) llseek(r1, 0x8, 0x1, &(0x7f0000000340), 0x1) r4 = openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kmesg\x00', 0xb, 0x1, 0x0) llseek(r4, 0xff, 0x7fffffff, &(0x7f00000003c0), 0x2) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000400)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000440)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) r5 = openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000480)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) openat(r5, &(0x7f00000004c0)='./file0\x00', 0x8, 0x80, 0x84) exec(&(0x7f0000000500)='./file0\x00', 0x8, &(0x7f0000000540)='/net/ipifc/1/listen\x00', 0x14) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000680)='/dev/stdin\x00', 0xb, 0x3, 0x0) stat(&(0x7f00000006c0)='./file0\x00', 0x8, &(0x7f0000000700)) tcgetattr(r1, &(0x7f0000000780)) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f00000007c0)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) r6 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000800)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) fcntl$F_DUPFD(r3, 0x0, r6, 0x1) 00:48:15 executing program 7: fstat(0xffffffffffffff9c, &(0x7f0000000000)) r0 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) write(r0, &(0x7f00000000c0)="f13d9edda87a9bd33954f1321a59b759b8949cc9b053b2cd53161ebe1a483e2286b7269ad4cdb9bf16bef44249ce33b3a58e817b134545f03780bb8f0b7ca711bd4d5363b4e0f05e8d0e6bf5a48232e4a9e4c2b673ea54e362705539b8417561c85081cb2e3d40b56123ea1666fa3fceb633327ff5fac29f54d57b993325931e8a49cc17a9a397a3607e689fef91f1d2e6d33458fd2f89e4d164aeaa1fc277f8189d99934d3300b8ae43fd919c0d76a3481148c7b91e02b93176d04b78df615ee95c70342e620f45bf17bd167e8cf12a0b8c38336f9bdd4ca8891f07d74cdea12a50f759539bc31e9c39891e", 0xec) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) r1 = openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) tcgetattr(r1, &(0x7f0000000280)) fcntl$F_GETFD(0xffffffffffffffff, 0x1) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) tcgetattr(0xffffffffffffff9c, &(0x7f0000000300)) r2 = openat$net_log(0xffffffffffffff9c, &(0x7f0000000340)='/net/log\x00', 0x9, 0x3, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) r3 = openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) nmount(r3, &(0x7f0000000400)='./file0\x00', 0x8, 0x10) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000440)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) r4 = openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000500)='/net/iprouter\x00', 0xe, 0x3, 0x0) abort_sysc_fd(r4) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r5 = openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000580)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) fcntl$F_DUPFD(r5, 0x0, r0, 0x1) openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) fcntl$F_GETFD(r2, 0x1) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0xa, 0x1, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000700)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000740)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) [kernel] Invalid syscall 0 for proc 84 00:48:15 executing program 0: openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) r0 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000040)='/net/udp/clone\x00', 0xf, 0x3, 0x0) close(r0) r1 = openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sysstat\x00', 0xd, 0x3, 0x0) abort_sysc_fd(r1) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) write(r0, &(0x7f0000000100)="90a5db44c3b8a9e17dfc08fc6a8aa33d7148ba29b8b43d7c3ac5fab4cfc7471ad4e0013d58641ff9391d0a34ca7c530f2a", 0x31) r2 = openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat(r1, &(0x7f0000000180)='./file0\x00', 0x8, 0xffbe8c7ddbf82995, 0x3) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x3010, 0xffffffffffffffff, 0x9) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f00000001c0)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) tcgetattr(r1, &(0x7f0000000200)) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000240)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) r3 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000280)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) fstat(r3, &(0x7f00000002c0)) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sysstat\x00', 0xd, 0x3, 0x0) abort_sysc_fd(r3) link(&(0x7f0000000380)='./file0\x00', 0x8, &(0x7f00000003c0)='./file0\x00', 0x8) cache_invalidate() openat(r2, &(0x7f0000000400)='./file0\x00', 0x8, 0x10000, 0x4) abort_sysc_fd(r0) r4 = openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000440)='/prof/kpdata\x00', 0xd, 0x3, 0x0) llseek(r4, 0x7, 0x9, &(0x7f0000000480), 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f00000004c0)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000500)='/net/.empty\x00', 0xc, 0x3, 0x0) close(r4) r5 = openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) abort_sysc_fd(r5) abort_sysc_fd(r3) r6 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000580)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) fstat(r6, &(0x7f00000005c0)) kernel panic at kern/arch/x86/trap.c:635, from core 0: Damn Damn! Unhandled trap in the kernel! HW TRAP frame at 0xfffffff0000527b0 on core 0 rax 0x0000000000000001 rbx 0xffff800015880d00 rcx 0xffff800015bac000 rdx 0x0000000000000000 rbp 0xfffffff0000528c8 rsi 0x0000000020000d00 rdi 0xffff800015880d00 r8 0x0000000000000000 r9 0x0000000000000000 r10 0x00000000000005b8 r11 0xffff800006de86dc r12 0x0000000020000d00 r13 0x0000000000000000 r14 0xfffffff000052910 r15 0xffff80000219dd01 trap 0x00000000 Divide error gsbs 0xffffffffc8f42b00 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc2007a1e cs 0x------------0008 flag 0x0000000000010202 rsp 0xfffffff000052878 ss 0x------------0010 Backtrace of kernel context on Core 0: #01 [<0xffffffffc2007a1e>] in send_event #02 [<0xffffffffc2008484>] in fire_tap #03 [<0xffffffffc20165db>] in fire_data_taps #04 [<0xffffffffc201662a>] in ip_wake_cb #05 [<0xffffffffc203bc77>] in __qbwrite #06 [<0xffffffffc203c97b>] in qpassnolim #07 [<0xffffffffc202f391>] in tcpiput #08 [<0xffffffffc201e672>] in ipiput4 #09 [<0xffffffffc201aa31>] in etherread4 #10 [<0xffffffffc200b724>] in __ktask_wrapper #11 [<0xffffffffc205bced>] in process_routine_kmsg #12 [<0xffffffffc205565e>] in __smp_idle Args: 0x0000000020001080, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000 ƒq[f€iêƒkõ9"Lü¿¸]íé>À/•Üé6£6©SW TRAP frame (partial) at 0xffffffffc8f42e20 on core 1 ƒq[f€iêƒkõ9"Lü¿¸]íé>À/•Üé6£6© rbx 0x000030000003ce00 rbp 0x000030000003cef0 r12 0x0000000000000000 Entering Nanwan's Dungeon on Core 0 (Ints off): r13 0x0000000000485a3f Type 'help' for a list of commands. r14 0x0000000000487638 ROS(Core 0)> r15 0x0000000000000000 gsbs 0x0000000000000000 fsbs 0x0000000000000000 rip 0x0000000000438f4e rsp 0x000030000003cd20 mxcsr 0x00001f80 fpucw 0x037f